Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LGvZDRRknR.exe

Overview

General Information

Sample name:LGvZDRRknR.exe
renamed because original name is a hash value
Original sample name:ad56dd8d6a82960c2e4272b12fdffc0f4044eea525b319a488eec30ec74b1d19.exe
Analysis ID:1592726
MD5:5577aedd686307dcc768a7a1aefe8bb7
SHA1:3169e70a2eba65e56b6d13ad329beb2b2e3c794b
SHA256:ad56dd8d6a82960c2e4272b12fdffc0f4044eea525b319a488eec30ec74b1d19
Tags:encrypthub-orgexeuser-JAMESWT_MHT
Infos:

Detection

RHADAMANTHYS
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking mutex)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found evasive API chain checking for process token information
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • LGvZDRRknR.exe (PID: 4608 cmdline: "C:\Users\user\Desktop\LGvZDRRknR.exe" MD5: 5577AEDD686307DCC768A7A1AEFE8BB7)
    • svchost.exe (PID: 3428 cmdline: "C:\Windows\System32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RhadamanthysAccording to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine.
  • Sandworm
https://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys
{"C2 url": "https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
    00000000.00000003.1459418313.0000019E4D980000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
      00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
        00000002.00000003.1464387974.00000166CD3B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
          00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.3.LGvZDRRknR.exe.19e4fe70000.5.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              2.3.svchost.exe.166cf8a0000.5.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                2.3.svchost.exe.166cf8a0000.5.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  0.3.LGvZDRRknR.exe.19e4fe70000.5.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    0.3.LGvZDRRknR.exe.19e4fb90000.4.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 3 entries
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\LGvZDRRknR.exe", ParentImage: C:\Users\user\Desktop\LGvZDRRknR.exe, ParentProcessId: 4608, ParentProcessName: LGvZDRRknR.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 3428, ProcessName: svchost.exe
                      Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\LGvZDRRknR.exe", ParentImage: C:\Users\user\Desktop\LGvZDRRknR.exe, ParentProcessId: 4608, ParentProcessName: LGvZDRRknR.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 3428, ProcessName: svchost.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-16T13:25:33.633491+010028548021Domain Observed Used for C2 Detected154.216.20.2249773192.168.2.849706TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: LGvZDRRknR.exeMalware Configuration Extractor: Rhadamanthys {"C2 url": "https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp"}
                      Source: LGvZDRRknR.exeVirustotal: Detection: 65%Perma Link
                      Source: LGvZDRRknR.exeReversingLabs: Detection: 31%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                      Source: LGvZDRRknR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: kernel32.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernel32.pdb source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdb source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325BF40 FindFirstFileExW,0_2_00007FF65325BF40
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB5BC8 GetLogicalDriveStringsW,QueryDosDeviceW,0_3_0000019E4DBB5BC8

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2854802 - Severity 1 - ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert : 154.216.20.224:9773 -> 192.168.2.8:49706
                      Source: Malware configuration extractorURLs: https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp
                      Source: global trafficTCP traffic: 192.168.2.8:49706 -> 154.216.20.224:9773
                      Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: unknownTCP traffic detected without corresponding DNS query: 154.216.20.224
                      Source: svchost.exe, 00000002.00000002.1503153583.0000000A0271B000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp
                      Source: svchost.exe, 00000002.00000003.1490275504.00000166CD5A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudflare-dns.com/dns-query
                      Source: svchost.exe, 00000002.00000003.1490275504.00000166CD5A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudflare-dns.com/dns-queryMachineGuidSOFTWARE
                      Source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_498be3ad-d
                      Source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_7e4d83f0-5
                      Source: Yara matchFile source: 0.3.LGvZDRRknR.exe.19e4fe70000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.svchost.exe.166cf8a0000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.svchost.exe.166cf8a0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LGvZDRRknR.exe.19e4fe70000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LGvZDRRknR.exe.19e4fb90000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.svchost.exe.166cf5c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LGvZDRRknR.exe.19e4fb90000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.svchost.exe.166cf5c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: LGvZDRRknR.exe PID: 4608, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3428, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB5FA0 NtQueryInformationProcess,0_3_0000019E4DBB5FA0
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB8AE0 NtQuerySystemInformation,malloc,NtQuerySystemInformation,K32GetProcessImageFileNameW,0_3_0000019E4DBB8AE0
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB64C0 NtQuerySystemInformation,NtQuerySystemInformation,GetTokenInformation,CloseHandle,CloseHandle,0_3_0000019E4DBB64C0
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D5FA0 NtQueryInformationProcess,2_2_00000166CD6D5FA0
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_00007FF6532639080_3_00007FF653263908
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB51BC0_3_0000019E4DBB51BC
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB69D80_3_0000019E4DBB69D8
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB15000_3_0000019E4DBB1500
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB2F000_3_0000019E4DBB2F00
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBE4EA0_3_0000019E4DBBE4EA
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB9B4C0_3_0000019E4DBB9B4C
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB9E980_3_0000019E4DBB9E98
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB7FE80_3_0000019E4DBB7FE8
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBB43C0_3_0000019E4DBBB43C
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB442C0_3_0000019E4DBB442C
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBC5E8D0_3_0000019E4DBC5E8D
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325A4E00_2_00007FF65325A4E0
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF6532575280_2_00007FF653257528
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325BD340_2_00007FF65325BD34
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325773C0_2_00007FF65325773C
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325BF400_2_00007FF65325BF40
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF653261F880_2_00007FF653261F88
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325FFD80_2_00007FF65325FFD8
                      Source: C:\Windows\System32\svchost.exeCode function: 2_3_00000166CD3709982_3_00000166CD370998
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D69D82_2_00000166CD6D69D8
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D51BC2_2_00000166CD6D51BC
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D7FE82_2_00000166CD6D7FE8
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D9E982_2_00000166CD6D9E98
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D442C2_2_00000166CD6D442C
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6DB43C2_2_00000166CD6DB43C
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6DE4EA2_2_00000166CD6DE4EA
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D15002_2_00000166CD6D1500
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D2F002_2_00000166CD6D2F00
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6D9B4C2_2_00000166CD6D9B4C
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6E93F82_2_00000166CD6E93F8
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6E4A852_2_00000166CD6E4A85
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6EA77E2_2_00000166CD6EA77E
                      Source: LGvZDRRknR.exeBinary or memory string: OriginalFilename vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FF06000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FD08000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E50105000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000000.1449310718.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCFF Explorer.exe: vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FD0B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exeBinary or memory string: OriginalFilenameCFF Explorer.exe: vs LGvZDRRknR.exe
                      Source: LGvZDRRknR.exeBinary or memory string: FaI O k.h.o.vBP.tV.R.u_t_X_Pt G-~ qoUy_Wc_k_P v
                      Source: LGvZDRRknR.exeBinary or memory string: u.C.Ji.rDd_qU q q.q p d.L$_vX v_k: i_fMly.JPf.3 X_tFT.O_k_a_C H f<) F.yc: E_r_P.h P R_qY K.R.y w,v S q O L F j}.ZJ.b_J zF p.L7 KLJ.R_g_a.Q@.a_N.QAD NC nB k a< s_t w c_sQ_e z.i.Q.v.2.7.n[.t_rX.9_lqY/}V W a:F_l nYo R.k x_B Q W.M.b.S_wkM.9.7.s4 K{F_j_L- f_l0 J.SL5Y$_Q.U.s.RL f w.Q.HT.W.Tta0 t TTgz G sk f.9.Fh.K cIlA_Mx.e G.P_y_r_t.c t.a.6_u.FaI O k.h.o.vBP.tV.R.u_t_X_Pt G-~ qoUy_Wc_k_P v.1_q_w_J_xmbg<_r_p.Z`n.x
                      Source: classification engineClassification label: mal88.troj.evad.winEXE@3/0@0/1
                      Source: C:\Windows\System32\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-40bf6037-4e6f-965ae0-f901919f7387}
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: LGvZDRRknR.exeVirustotal: Detection: 65%
                      Source: LGvZDRRknR.exeReversingLabs: Detection: 31%
                      Source: unknownProcess created: C:\Users\user\Desktop\LGvZDRRknR.exe "C:\Users\user\Desktop\LGvZDRRknR.exe"
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wudfplatform.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: LGvZDRRknR.exeStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: LGvZDRRknR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: LGvZDRRknR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: LGvZDRRknR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: LGvZDRRknR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: LGvZDRRknR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: LGvZDRRknR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: LGvZDRRknR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: LGvZDRRknR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: kernel32.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernel32.pdb source: LGvZDRRknR.exe, 00000000.00000003.1461246981.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1461316537.0000019E4FC50000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467073108.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1467573874.00000166CF680000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: LGvZDRRknR.exe, 00000000.00000003.1460366361.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1460527686.0000019E4FD80000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1466417114.00000166CF7B0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1465545200.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: kernelbase.pdb source: LGvZDRRknR.exe, 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, LGvZDRRknR.exe, 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp
                      Source: LGvZDRRknR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: LGvZDRRknR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: LGvZDRRknR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: LGvZDRRknR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: LGvZDRRknR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: LGvZDRRknR.exeStatic PE information: section name: .textbss
                      Source: LGvZDRRknR.exeStatic PE information: section name: _RDATA
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_00007FF653263864 push cs; ret 0_3_00007FF6532638C3
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_00007FF653268250 pushad ; iretd 0_3_00007FF653268256
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_00007FF65326815E push edi; ret 0_3_00007FF653268164
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_00007FF65326833E push esi; ret 0_3_00007FF653268345
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_00007FF65326853E push eax; retf 0_3_00007FF653268541
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_00007FF653263822 push cs; ret 0_3_00007FF6532638C3
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD19C push esi; retf 0_3_0000019E4DBBD1A3
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD194 push esi; retf 0_3_0000019E4DBBD19B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD18C push esi; retf 0_3_0000019E4DBBD193
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD16C push ebp; retf 0_3_0000019E4DBBD18B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD1DC push ebp; retf 0_3_0000019E4DBBD1FB
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD1D4 push ebp; retf 0_3_0000019E4DBBD1DB
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD1B4 push ebp; retf 0_3_0000019E4DBBD1C3
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD1AC push esi; retf 0_3_0000019E4DBBD1B3
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD1A4 push esi; retf 0_3_0000019E4DBBD1AB
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD11C push ebp; retf 0_3_0000019E4DBBD12B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD114 push ebp; retf 0_3_0000019E4DBBD11B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD10C push ebp; retf 0_3_0000019E4DBBD16B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD0E4 push ebp; retf 0_3_0000019E4DBBD10B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD15C push ebp; retf 0_3_0000019E4DBBD16B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD14C push esi; retf 0_3_0000019E4DBBD15B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD144 push ebp; retf 0_3_0000019E4DBBD14B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD12C push ebp; retf 0_3_0000019E4DBBD13B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD09A push ebp; retf 0_3_0000019E4DBBD09B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD084 push edi; retf 0_3_0000019E4DBBD093
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBC0684 push ebp; retf 0_3_0000019E4DBC068B
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD26C pushfd ; retf 0_3_0000019E4DBBD2A2
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD264 pushfd ; retf 0_3_0000019E4DBBD2CA
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD0DC push ebp; retf 0_3_0000019E4DBBD0E3
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBBD0CC push esi; retf 0_3_0000019E4DBBD0DB
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB3CC4 push E8000098h; ret 0_3_0000019E4DBB3CC9
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\System32\svchost.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_2-4068
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HOOKEXPLORER.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
                      Source: LGvZDRRknR.exeBinary or memory string: ORIGINALFILENAMECFF EXPLORER.EXE:
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
                      Source: LGvZDRRknR.exeBinary or memory string: CFF EXPLORER.EXE
                      Source: LGvZDRRknR.exeBinary or memory string: INTERNALNAMECFF EXPLORER.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EXP64.EXETCPVIEW.EXETCPVIEW64.EXEPROCMON.EXEPROCMON64.EXEVMMAP.EXEVMMAP64.EXEPORTMON.EXEPROCESSLASSO.EXEWIRESHARK.EXEFIDDLER EVERYWHERE.EXEFIDDLER.EXEIDA.EXEIDA64.EXEIMMUNITYDEBUGGER.EXEWINDUMP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEPROCESSHACKER.EXEIDAQ64.EXEAUTORUNS.EXEDUMPCAP.EXEDE4DOT.EXEHOOKEXPLORER.EXEILSPY.EXELORDPE.EXEDNSPY.EXEPETOOLS.EXEAUTORUNSC.EXERESOURCEHACKER.EXEFILEMON.EXEREGMON.EXEWINDANR.EXEWINDBG.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDANR.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
                      Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000166CD6E711B sldt word ptr [esi]2_2_00000166CD6E711B
                      Source: C:\Windows\System32\svchost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-4089
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325BF40 FindFirstFileExW,0_2_00007FF65325BF40
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB5BC8 GetLogicalDriveStringsW,QueryDosDeviceW,0_3_0000019E4DBB5BC8
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_3_0000019E4DBB573C GetSystemInfo,0_3_0000019E4DBB573C
                      Source: svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
                      Source: svchost.exe, 00000002.00000002.1503548284.00000166CD413000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1503582315.00000166CD45D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
                      Source: svchost.exe, 00000002.00000002.1503548284.00000166CD413000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325B6E8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF65325B6E8
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF653257108 GetProcessHeap,HeapAlloc,HeapFree,VirtualFree,HeapFree,0_2_00007FF653257108
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF6532580D8 SetUnhandledExceptionFilter,0_2_00007FF6532580D8
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF653262520 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF653262520
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF65325B6E8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF65325B6E8
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF653257EF4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF653257EF4
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF653261DD0 cpuid 0_2_00007FF653261DD0
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\LGvZDRRknR.exeCode function: 0_2_00007FF653257DCC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF653257DCC
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OllyDbg.exe
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tcpview.exe
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Wireshark.exe
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lordpe.exe
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Procmon.exe
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: autoruns.exe
                      Source: svchost.exe, 00000002.00000002.1503622485.00000166CD505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regmon.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1459418313.0000019E4D980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.1464387974.00000166CD3B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1459418313.0000019E4D980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.1464387974.00000166CD3B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      2
                      Virtualization/Sandbox Evasion
                      21
                      Input Capture
                      1
                      System Time Discovery
                      Remote Services21
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts11
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Process Injection
                      LSASS Memory141
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Obfuscated Files or Information
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      LGvZDRRknR.exe65%VirustotalBrowse
                      LGvZDRRknR.exe32%ReversingLabsWin64.Trojan.Rhadamanthys
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopp0%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://154.216.20.224:9773/a36090f1390c7cab81330/1a7qev84.1gopptrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://cloudflare-dns.com/dns-querysvchost.exe, 00000002.00000003.1490275504.00000166CD5A5000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://cloudflare-dns.com/dns-queryMachineGuidSOFTWAREsvchost.exe, 00000002.00000003.1490275504.00000166CD5A5000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          154.216.20.224
                          unknownSeychelles
                          135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                          Joe Sandbox version:42.0.0 Malachite
                          Analysis ID:1592726
                          Start date and time:2025-01-16 13:24:25 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 3m 33s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:3
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:LGvZDRRknR.exe
                          renamed because original name is a hash value
                          Original Sample Name:ad56dd8d6a82960c2e4272b12fdffc0f4044eea525b319a488eec30ec74b1d19.exe
                          Detection:MAL
                          Classification:mal88.troj.evad.winEXE@3/0@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 81%
                          • Number of executed functions: 56
                          • Number of non-executed functions: 32
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): dllhost.exe
                          No simulations
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          154.216.20.224MsmxWY8nj7.exeGet hashmaliciousRHADAMANTHYSBrowse
                            rFUdi0G5rK.exeGet hashmaliciousRHADAMANTHYSBrowse
                              hsefawdrthg.exeGet hashmaliciousRHADAMANTHYSBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SKHT-ASShenzhenKatherineHengTechnologyInformationCoP87unxnF4t4DSrTt43.exeGet hashmaliciousRemcosBrowse
                                • 154.216.16.38
                                new.batGet hashmaliciousUnknownBrowse
                                • 154.216.17.175
                                https://caringforyousupport.com.au/Receipt536354.phpGet hashmaliciousWinSearchAbuseBrowse
                                • 154.216.17.175
                                https://9817157365.com/Get hashmaliciousUnknownBrowse
                                • 160.202.168.107
                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                • 154.216.16.38
                                1E3Vcm2yrA.exeGet hashmaliciousRHADAMANTHYSBrowse
                                • 154.216.18.169
                                icivfhp7cR.exeGet hashmaliciousGhostRatBrowse
                                • 45.207.211.42
                                6.elfGet hashmaliciousUnknownBrowse
                                • 154.211.34.18
                                wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                • 154.216.16.103
                                wind.arm.elfGet hashmaliciousMiraiBrowse
                                • 154.216.16.103
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                Entropy (8bit):6.104074500107275
                                TrID:
                                • Win64 Executable GUI (202006/5) 92.65%
                                • Win64 Executable (generic) (12005/4) 5.51%
                                • Generic Win/DOS Executable (2004/3) 0.92%
                                • DOS Executable Generic (2002/1) 0.92%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:LGvZDRRknR.exe
                                File size:458'752 bytes
                                MD5:5577aedd686307dcc768a7a1aefe8bb7
                                SHA1:3169e70a2eba65e56b6d13ad329beb2b2e3c794b
                                SHA256:ad56dd8d6a82960c2e4272b12fdffc0f4044eea525b319a488eec30ec74b1d19
                                SHA512:c36f7d1f5c6e9e7af10a671e8c1f469371dcb2bf3e6e3c1214ef518d3e8285928275d9bd693d496cd3796af89b863a4dd6e03b6760a1ad8d56a653eadb9a34df
                                SSDEEP:6144:FpOJNiES3OsC1hgZ7Mj3mshfV1dC405xnBRaF1Tpnypgza8oC6gspgyLoO:FxEECvgZ7Mj3mshfrdC425Hi11ZfA
                                TLSH:B6A44A8DB67B4DE6C5DA96FB80758280F1036C90B051C62AE69D9423EDD32D28FD1B3D
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................8...................................................x.......x.F.....x.......Rich...........
                                Icon Hash:100109193979390f
                                Entrypoint:0x140007b68
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x140000000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x645F7B5E [Sat May 13 11:58:22 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:7982162fc07c5c56d2743590bfe85e5c
                                Instruction
                                dec eax
                                sub esp, 28h
                                call 00007F0524F80FA0h
                                dec eax
                                add esp, 28h
                                jmp 00007F0524F80BBFh
                                int3
                                int3
                                dec eax
                                sub esp, 28h
                                call 00007F0524F81520h
                                test eax, eax
                                je 00007F0524F80D63h
                                dec eax
                                mov eax, dword ptr [00000030h]
                                dec eax
                                mov ecx, dword ptr [eax+08h]
                                jmp 00007F0524F80D47h
                                dec eax
                                cmp ecx, eax
                                je 00007F0524F80D56h
                                xor eax, eax
                                dec eax
                                cmpxchg dword ptr [00075310h], ecx
                                jne 00007F0524F80D30h
                                xor al, al
                                dec eax
                                add esp, 28h
                                ret
                                mov al, 01h
                                jmp 00007F0524F80D39h
                                int3
                                int3
                                int3
                                inc eax
                                push ebx
                                dec eax
                                sub esp, 20h
                                movzx eax, byte ptr [000752FBh]
                                test ecx, ecx
                                mov ebx, 00000001h
                                cmove eax, ebx
                                mov byte ptr [000752EBh], al
                                call 00007F0524F81327h
                                call 00007F0524F81FD2h
                                test al, al
                                jne 00007F0524F80D46h
                                xor al, al
                                jmp 00007F0524F80D56h
                                call 00007F0524F83AE9h
                                test al, al
                                jne 00007F0524F80D4Bh
                                xor ecx, ecx
                                call 00007F0524F81FE2h
                                jmp 00007F0524F80D2Ch
                                mov al, bl
                                dec eax
                                add esp, 20h
                                pop ebx
                                ret
                                int3
                                int3
                                int3
                                inc eax
                                push ebx
                                dec eax
                                sub esp, 20h
                                cmp byte ptr [000752B0h], 00000000h
                                mov ebx, ecx
                                jne 00007F0524F80DA9h
                                cmp ecx, 01h
                                jnbe 00007F0524F80DACh
                                call 00007F0524F81486h
                                test eax, eax
                                je 00007F0524F80D6Ah
                                test ebx, ebx
                                jne 00007F0524F80D66h
                                dec eax
                                lea ecx, dword ptr [0007529Ah]
                                call 00007F0524F80E06h
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x729700x28.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x810000x14e0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7f0000xd8c.pdata
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x830000x2754.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x719700x1c.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x719900x138.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x230000x220.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x11bd00x11c0075b411fdd2335dc974ee48a373125c2fFalse0.5500385123239436data6.39234273254032IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .textbss0x130000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rdata0x230000x500a80x50200ddfdcf558d032e04e29038497520b5deFalse0.6559727232839313COM executable for DOS5.526075047112614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x740000xa0880x9000d5e5654f6d41ad894530404258a9a3e7False0.20570203993055555data4.063815026736459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .pdata0x7f0000xd8c0xe000559f6ed0bebb86dd2d46ff8f7a216a4False0.47572544642857145data4.853838093653359IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                _RDATA0x800000xf40x200892ee00c2b30bc0d55f14c1db9a574e2False0.298828125data1.9622243236400891IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x810000x14e00x160069fed712ec0f2f072c0af9917eb9fbf8False0.2801846590909091data3.9222000644747492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x830000x27540x280077b69bb1067abb8f717ee3a14a964833False0.1509765625data5.430302131953574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x810f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.2619606003752345
                                RT_GROUP_ICON0x821980x14dataEnglishUnited States1.1
                                RT_VERSION0x821b00x32cdataEnglishUnited States0.4445812807881773
                                DLLImport
                                KERNEL32.dllCloseHandle, HeapAlloc, HeapFree, GetProcessHeap, WaitForSingleObject, CreateEventW, WriteConsoleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, RtlUnwindEx, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, GetModuleFileNameW, GetCurrentProcess, ExitProcess, TerminateProcess, GetModuleHandleExW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, SetFilePointerEx, CreateFileW
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2025-01-16T13:25:33.633491+01002854802ETPRO MALWARE Suspected Rhadamanthys Related SSL Cert1154.216.20.2249773192.168.2.849706TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 16, 2025 13:25:32.923044920 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:32.927851915 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:32.927949905 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:32.928080082 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:32.932835102 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:33.588218927 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:33.628691912 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:33.633491039 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:33.832959890 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:33.875536919 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:33.876720905 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:33.881545067 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:34.077810049 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:34.077858925 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:34.077904940 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:34.077965021 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:34.078155041 CET497069773192.168.2.8154.216.20.224
                                Jan 16, 2025 13:25:34.082725048 CET977349706154.216.20.224192.168.2.8
                                Jan 16, 2025 13:25:34.082928896 CET977349706154.216.20.224192.168.2.8

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:07:25:27
                                Start date:16/01/2025
                                Path:C:\Users\user\Desktop\LGvZDRRknR.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\LGvZDRRknR.exe"
                                Imagebase:0x7ff653250000
                                File size:458'752 bytes
                                MD5 hash:5577AEDD686307DCC768A7A1AEFE8BB7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000000.00000003.1459418313.0000019E4D980000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1462053955.0000019E4FB90000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1463700898.0000019E4FE70000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:07:25:29
                                Start date:16/01/2025
                                Path:C:\Windows\System32\svchost.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\System32\svchost.exe"
                                Imagebase:0x7ff67e6d0000
                                File size:55'320 bytes
                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000002.00000003.1464387974.00000166CD3B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000003.1470244839.00000166CF8A0000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000003.1468650559.00000166CF5C0000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:35.3%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:6.7%
                                  Total number of Nodes:886
                                  Total number of Limit Nodes:9
                                  execution_graph 5930 7ff653258e6c 5937 7ff653259134 5930->5937 5936 7ff653258e79 5949 7ff65325941c 5937->5949 5940 7ff653258e75 5940->5936 5942 7ff6532590c8 5940->5942 5941 7ff653259168 __vcrt_uninitialize_locks DeleteCriticalSection 5941->5940 5954 7ff6532592f0 5942->5954 5950 7ff6532591a0 __vcrt_FlsAlloc 5 API calls 5949->5950 5951 7ff653259452 5950->5951 5952 7ff65325914c 5951->5952 5953 7ff653259467 InitializeCriticalSectionAndSpinCount 5951->5953 5952->5940 5952->5941 5953->5952 5955 7ff6532591a0 __vcrt_FlsAlloc 5 API calls 5954->5955 5956 7ff653259315 TlsAlloc 5955->5956 6062 7ff65325fcec 6063 7ff65325cd40 45 API calls 6062->6063 6064 7ff65325fcf5 6063->6064 6065 7ff6532580e8 6066 7ff65325811c 6065->6066 6067 7ff653258100 6065->6067 6067->6066 6074 7ff653258f24 6067->6074 6072 7ff65325a9dc 34 API calls 6073 7ff653258142 6072->6073 6080 7ff653258fec 6074->6080 6077 7ff653258f38 6078 7ff653258fec 43 API calls 6077->6078 6079 7ff65325813a 6078->6079 6079->6072 6086 7ff653259008 6080->6086 6083 7ff65325812e 6083->6077 6084 7ff65325aa70 34 API calls 6085 7ff653259004 6084->6085 6087 7ff653259027 GetLastError 6086->6087 6088 7ff653258ff5 6086->6088 6098 7ff653259380 6087->6098 6088->6083 6088->6084 6099 7ff6532591a0 __vcrt_FlsAlloc 5 API calls 6098->6099 6100 7ff6532593a7 TlsGetValue 6099->6100 6273 7ff653257b68 6276 7ff653257dcc 6273->6276 6277 7ff653257b71 6276->6277 6278 7ff653257def GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6276->6278 6278->6277 5092 7ff653259ca8 5093 7ff653259cc1 5092->5093 5102 7ff653259cbd 5092->5102 5104 7ff65325cd40 5093->5104 5098 7ff653259cd3 5101 7ff65325b9dc __free_lconv_num 14 API calls 5098->5101 5101->5102 5105 7ff65325cd4d 5104->5105 5106 7ff653259cc6 5104->5106 5145 7ff65325b4ac 5105->5145 5110 7ff65325d220 GetEnvironmentStringsW 5106->5110 5111 7ff65325d24e 5110->5111 5121 7ff65325d2f0 5110->5121 5114 7ff65325d188 WideCharToMultiByte 5111->5114 5112 7ff65325d2fa FreeEnvironmentStringsW 5113 7ff653259ccb 5112->5113 5113->5098 5122 7ff653259d14 5113->5122 5115 7ff65325d2a0 5114->5115 5116 7ff65325dcbc 15 API calls 5115->5116 5115->5121 5117 7ff65325d2af 5116->5117 5118 7ff65325d188 WideCharToMultiByte 5117->5118 5120 7ff65325d2d9 5117->5120 5118->5120 5119 7ff65325b9dc __free_lconv_num 14 API calls 5119->5121 5120->5119 5121->5112 5121->5113 5123 7ff653259d3b 5122->5123 5124 7ff65325b964 _set_fmode 14 API calls 5123->5124 5134 7ff653259d70 5124->5134 5125 7ff653259ddf 5126 7ff65325b9dc __free_lconv_num 14 API calls 5125->5126 5127 7ff653259ce0 5126->5127 5139 7ff65325b9dc 5127->5139 5128 7ff65325b964 _set_fmode 14 API calls 5128->5134 5129 7ff653259dd0 5574 7ff653259e1c 5129->5574 5133 7ff653259e07 5136 7ff65325b91c _invalid_parameter_noinfo 17 API calls 5133->5136 5134->5125 5134->5128 5134->5129 5134->5133 5137 7ff65325b9dc __free_lconv_num 14 API calls 5134->5137 5565 7ff65325aa10 5134->5565 5135 7ff65325b9dc __free_lconv_num 14 API calls 5135->5125 5138 7ff653259e19 5136->5138 5137->5134 5140 7ff65325b9e1 RtlFreeHeap 5139->5140 5144 7ff65325ba11 __free_lconv_num 5139->5144 5141 7ff65325b9fc 5140->5141 5140->5144 5142 7ff65325ac90 _set_fmode 12 API calls 5141->5142 5143 7ff65325ba01 GetLastError 5142->5143 5143->5144 5144->5098 5146 7ff65325b4bd 5145->5146 5150 7ff65325b4c2 5145->5150 5188 7ff65325e5a8 5146->5188 5149 7ff65325b4ca 5158 7ff65325b544 5149->5158 5209 7ff65325aa70 5149->5209 5150->5149 5192 7ff65325e5f0 5150->5192 5156 7ff65325b512 5160 7ff65325e5f0 _set_fmode 6 API calls 5156->5160 5157 7ff65325b502 5159 7ff65325e5f0 _set_fmode 6 API calls 5157->5159 5170 7ff65325cac4 5158->5170 5161 7ff65325b509 5159->5161 5162 7ff65325b51a 5160->5162 5166 7ff65325b9dc __free_lconv_num 14 API calls 5161->5166 5163 7ff65325b51e 5162->5163 5164 7ff65325b530 5162->5164 5167 7ff65325e5f0 _set_fmode 6 API calls 5163->5167 5204 7ff65325b188 5164->5204 5166->5149 5167->5161 5399 7ff65325cc88 5170->5399 5172 7ff65325caed 5414 7ff65325c7d0 5172->5414 5175 7ff65325cb07 5175->5106 5177 7ff65325b9dc __free_lconv_num 14 API calls 5177->5175 5181 7ff65325cbd3 5184 7ff65325cc10 5181->5184 5185 7ff65325b9dc __free_lconv_num 14 API calls 5181->5185 5182 7ff65325cbae 5183 7ff65325ac90 _set_fmode 14 API calls 5182->5183 5187 7ff65325cbb3 5183->5187 5184->5187 5440 7ff65325c614 5184->5440 5185->5184 5187->5177 5218 7ff65325e2b4 5188->5218 5193 7ff65325e2b4 try_get_function 5 API calls 5192->5193 5194 7ff65325e61e 5193->5194 5195 7ff65325b4e1 5194->5195 5196 7ff65325e630 TlsSetValue 5194->5196 5195->5149 5197 7ff65325b964 5195->5197 5196->5195 5203 7ff65325b975 _set_fmode 5197->5203 5198 7ff65325b9c6 5231 7ff65325ac90 5198->5231 5199 7ff65325b9aa HeapAlloc 5200 7ff65325b4f4 5199->5200 5199->5203 5200->5156 5200->5157 5203->5198 5203->5199 5228 7ff65325e9d0 5203->5228 5263 7ff65325b060 5204->5263 5277 7ff65325ea7c 5209->5277 5219 7ff65325e315 TlsGetValue 5218->5219 5226 7ff65325e310 try_get_function 5218->5226 5220 7ff65325e3f8 5220->5219 5223 7ff65325e406 GetProcAddress 5220->5223 5221 7ff65325e344 LoadLibraryExW 5222 7ff65325e365 GetLastError 5221->5222 5221->5226 5222->5226 5224 7ff65325e417 5223->5224 5224->5219 5225 7ff65325e3dd FreeLibrary 5225->5226 5226->5219 5226->5220 5226->5221 5226->5225 5227 7ff65325e39f LoadLibraryExW 5226->5227 5227->5226 5234 7ff65325ea00 5228->5234 5240 7ff65325b554 GetLastError 5231->5240 5233 7ff65325ac99 5233->5200 5239 7ff65325d36c EnterCriticalSection 5234->5239 5241 7ff65325b576 5240->5241 5244 7ff65325b57b 5240->5244 5242 7ff65325e5a8 _set_fmode 6 API calls 5241->5242 5242->5244 5243 7ff65325e5f0 _set_fmode 6 API calls 5245 7ff65325b59e 5243->5245 5244->5243 5246 7ff65325b583 SetLastError 5244->5246 5245->5246 5248 7ff65325b964 _set_fmode 12 API calls 5245->5248 5246->5233 5249 7ff65325b5b1 5248->5249 5250 7ff65325b5cf 5249->5250 5251 7ff65325b5bf 5249->5251 5252 7ff65325e5f0 _set_fmode 6 API calls 5250->5252 5253 7ff65325e5f0 _set_fmode 6 API calls 5251->5253 5254 7ff65325b5d7 5252->5254 5255 7ff65325b5c6 5253->5255 5256 7ff65325b5db 5254->5256 5257 7ff65325b5ed 5254->5257 5260 7ff65325b9dc __free_lconv_num 12 API calls 5255->5260 5258 7ff65325e5f0 _set_fmode 6 API calls 5256->5258 5259 7ff65325b188 _set_fmode 12 API calls 5257->5259 5258->5255 5261 7ff65325b5f5 5259->5261 5260->5246 5262 7ff65325b9dc __free_lconv_num 12 API calls 5261->5262 5262->5246 5275 7ff65325d36c EnterCriticalSection 5263->5275 5311 7ff65325ea34 5277->5311 5316 7ff65325d36c EnterCriticalSection 5311->5316 5400 7ff65325ccab 5399->5400 5403 7ff65325ccb5 5400->5403 5455 7ff65325d36c EnterCriticalSection 5400->5455 5404 7ff65325cd27 5403->5404 5406 7ff65325aa70 34 API calls 5403->5406 5404->5172 5407 7ff65325cd3f 5406->5407 5409 7ff65325cd92 5407->5409 5411 7ff65325b4ac 34 API calls 5407->5411 5409->5172 5412 7ff65325cd7c 5411->5412 5413 7ff65325cac4 45 API calls 5412->5413 5413->5409 5456 7ff653259588 5414->5456 5417 7ff65325c802 5419 7ff65325c817 5417->5419 5420 7ff65325c807 GetACP 5417->5420 5418 7ff65325c7f0 GetOEMCP 5418->5419 5419->5175 5421 7ff65325dcbc 5419->5421 5420->5419 5422 7ff65325dd07 5421->5422 5427 7ff65325dccb _set_fmode 5421->5427 5424 7ff65325ac90 _set_fmode 14 API calls 5422->5424 5423 7ff65325dcee HeapAlloc 5425 7ff65325dd05 5423->5425 5423->5427 5426 7ff65325cb18 5424->5426 5425->5426 5426->5187 5429 7ff65325cdbc 5426->5429 5427->5422 5427->5423 5428 7ff65325e9d0 _set_fmode 2 API calls 5427->5428 5428->5427 5430 7ff65325c7d0 36 API calls 5429->5430 5431 7ff65325cde7 5430->5431 5433 7ff65325ce24 IsValidCodePage 5431->5433 5438 7ff65325ce67 __scrt_get_show_window_mode 5431->5438 5432 7ff653262500 _handle_error 8 API calls 5434 7ff65325cba7 5432->5434 5435 7ff65325ce35 5433->5435 5433->5438 5434->5181 5434->5182 5436 7ff65325ce6c GetCPInfo 5435->5436 5439 7ff65325ce3e __scrt_get_show_window_mode 5435->5439 5436->5438 5436->5439 5438->5432 5488 7ff65325c8e0 5439->5488 5564 7ff65325d36c EnterCriticalSection 5440->5564 5457 7ff6532595ac 5456->5457 5458 7ff6532595a7 5456->5458 5457->5458 5459 7ff65325b3d8 34 API calls 5457->5459 5458->5417 5458->5418 5460 7ff6532595c7 5459->5460 5464 7ff65325b680 5460->5464 5465 7ff6532595ea 5464->5465 5466 7ff65325b695 5464->5466 5468 7ff65325b6b4 5465->5468 5466->5465 5472 7ff65325e1e0 5466->5472 5469 7ff65325b6c9 5468->5469 5470 7ff65325b6dc 5468->5470 5469->5470 5485 7ff65325cda0 5469->5485 5470->5458 5473 7ff65325b3d8 34 API calls 5472->5473 5474 7ff65325e1ef 5473->5474 5476 7ff65325e238 5474->5476 5484 7ff65325d36c EnterCriticalSection 5474->5484 5476->5465 5486 7ff65325b3d8 34 API calls 5485->5486 5487 7ff65325cda9 5486->5487 5489 7ff65325c91d GetCPInfo 5488->5489 5490 7ff65325ca15 5488->5490 5489->5490 5496 7ff65325c930 5489->5496 5491 7ff653262500 _handle_error 8 API calls 5490->5491 5492 7ff65325caae 5491->5492 5492->5438 5499 7ff65325dd1c 5496->5499 5498 7ff65325afc8 39 API calls 5498->5490 5500 7ff653259588 34 API calls 5499->5500 5501 7ff65325dd5e 5500->5501 5519 7ff65325d12c 5501->5519 5503 7ff65325dd9b 5506 7ff653262500 _handle_error 8 API calls 5503->5506 5504 7ff65325dd94 5504->5503 5505 7ff65325dcbc 15 API calls 5504->5505 5508 7ff65325ddc0 __scrt_get_show_window_mode 5504->5508 5505->5508 5507 7ff65325c9a9 5506->5507 5514 7ff65325afc8 5507->5514 5509 7ff65325d12c MultiByteToWideChar 5508->5509 5510 7ff65325de58 5508->5510 5511 7ff65325de3a 5509->5511 5510->5503 5512 7ff65325b9dc __free_lconv_num 14 API calls 5510->5512 5511->5510 5513 7ff65325de3e GetStringTypeW 5511->5513 5512->5503 5513->5510 5515 7ff653259588 34 API calls 5514->5515 5516 7ff65325afed 5515->5516 5522 7ff65325acb0 5516->5522 5520 7ff65325d134 MultiByteToWideChar 5519->5520 5523 7ff65325acf2 5522->5523 5524 7ff65325d12c MultiByteToWideChar 5523->5524 5528 7ff65325ad3c 5524->5528 5525 7ff65325af7b 5526 7ff653262500 _handle_error 8 API calls 5525->5526 5527 7ff65325af89 5526->5527 5527->5498 5528->5525 5529 7ff65325ad6f 5528->5529 5530 7ff65325dcbc 15 API calls 5528->5530 5531 7ff65325d12c MultiByteToWideChar 5529->5531 5533 7ff65325ae73 5529->5533 5530->5529 5532 7ff65325ade1 5531->5532 5532->5533 5550 7ff65325e6a8 5532->5550 5533->5525 5535 7ff65325b9dc __free_lconv_num 14 API calls 5533->5535 5535->5525 5537 7ff65325ae82 5539 7ff65325dcbc 15 API calls 5537->5539 5542 7ff65325ae9c 5537->5542 5538 7ff65325ae30 5538->5533 5540 7ff65325e6a8 7 API calls 5538->5540 5539->5542 5540->5533 5541 7ff65325e6a8 7 API calls 5544 7ff65325af1d 5541->5544 5542->5533 5542->5541 5543 7ff65325af52 5543->5533 5545 7ff65325b9dc __free_lconv_num 14 API calls 5543->5545 5544->5543 5558 7ff65325d188 5544->5558 5545->5533 5551 7ff65325e2b4 try_get_function 5 API calls 5550->5551 5552 7ff65325e6e6 5551->5552 5553 7ff65325e6eb LCMapStringEx 5552->5553 5554 7ff65325e73d 5552->5554 5555 7ff65325ae1b 5553->5555 5561 7ff65325e784 5554->5561 5555->5533 5555->5537 5555->5538 5557 7ff65325e747 LCMapStringW 5557->5555 5559 7ff65325d1a4 WideCharToMultiByte 5558->5559 5562 7ff65325e2b4 try_get_function 5 API calls 5561->5562 5563 7ff65325e7b2 5562->5563 5563->5557 5566 7ff65325aa1d 5565->5566 5567 7ff65325aa27 5565->5567 5566->5567 5570 7ff65325aa42 5566->5570 5568 7ff65325ac90 _set_fmode 14 API calls 5567->5568 5569 7ff65325aa2e 5568->5569 5571 7ff65325b8fc _invalid_parameter_noinfo 31 API calls 5569->5571 5572 7ff65325aa3a 5570->5572 5573 7ff65325ac90 _set_fmode 14 API calls 5570->5573 5571->5572 5572->5134 5573->5569 5576 7ff653259e21 5574->5576 5579 7ff653259dd8 5574->5579 5575 7ff653259e4a 5578 7ff65325b9dc __free_lconv_num 14 API calls 5575->5578 5576->5575 5577 7ff65325b9dc __free_lconv_num 14 API calls 5576->5577 5577->5576 5578->5579 5579->5135 5580 7ff6532579f4 5607 7ff653257bb8 5580->5607 5583 7ff653257b40 5645 7ff653257ef4 IsProcessorFeaturePresent 5583->5645 5584 7ff653257a10 __scrt_acquire_startup_lock 5586 7ff653257b4a 5584->5586 5587 7ff653257a2e 5584->5587 5588 7ff653257ef4 7 API calls 5586->5588 5592 7ff653257a70 __scrt_release_startup_lock 5587->5592 5615 7ff653259fac 5587->5615 5593 7ff653257b55 5588->5593 5591 7ff653257a53 5595 7ff653257ad9 5592->5595 5634 7ff65325a28c 5592->5634 5619 7ff653258040 5595->5619 5597 7ff653257ade 5622 7ff653259ed8 5597->5622 5604 7ff653257b01 5604->5593 5641 7ff653257d4c 5604->5641 5652 7ff6532581bc 5607->5652 5610 7ff653257be7 5654 7ff65325a990 5610->5654 5613 7ff653257a08 5613->5583 5613->5584 5616 7ff653259fbf 5615->5616 5617 7ff653257a4f 5616->5617 5699 7ff653257910 5616->5699 5617->5591 5630 7ff653259f48 5617->5630 5829 7ff653258a50 5619->5829 5623 7ff65325cd40 45 API calls 5622->5623 5624 7ff653259ee7 5623->5624 5625 7ff653257ae6 5624->5625 5626 7ff65325d0f0 34 API calls 5624->5626 5627 7ff653256dd0 5625->5627 5626->5624 5831 7ff653257108 GetProcessHeap HeapAlloc 5627->5831 5631 7ff653259f7d 5630->5631 5632 7ff653259f97 5630->5632 5631->5632 5849 7ff65325f104 5631->5849 5632->5592 5635 7ff65325a2c2 5634->5635 5636 7ff65325a2b0 5634->5636 5872 7ff65325a9dc 5635->5872 5636->5595 5639 7ff653258084 GetModuleHandleW 5640 7ff653258095 5639->5640 5640->5604 5643 7ff653257d5d 5641->5643 5642 7ff653257b18 5642->5591 5643->5642 5644 7ff653258e94 __scrt_initialize_crt 7 API calls 5643->5644 5644->5642 5646 7ff653257f1a _invalid_parameter_noinfo __scrt_get_show_window_mode 5645->5646 5647 7ff653257f39 RtlCaptureContext RtlLookupFunctionEntry 5646->5647 5648 7ff653257f62 RtlVirtualUnwind 5647->5648 5649 7ff653257f9e __scrt_get_show_window_mode 5647->5649 5648->5649 5650 7ff653257fd0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5649->5650 5651 7ff653258022 _invalid_parameter_noinfo 5650->5651 5651->5586 5653 7ff653257bda __scrt_dllmain_crt_thread_attach 5652->5653 5653->5610 5653->5613 5655 7ff65325e90c 5654->5655 5656 7ff653257bec 5655->5656 5657 7ff65325cc88 45 API calls 5655->5657 5659 7ff65325cd40 45 API calls 5655->5659 5666 7ff65325d938 5655->5666 5656->5613 5660 7ff653258e94 5656->5660 5657->5655 5659->5655 5661 7ff653258e9c 5660->5661 5662 7ff653258ea6 5660->5662 5678 7ff653259110 5661->5678 5662->5613 5677 7ff65325d36c EnterCriticalSection 5666->5677 5668 7ff65325d948 5669 7ff65325d510 32 API calls 5668->5669 5670 7ff65325d951 5669->5670 5671 7ff65325d95f 5670->5671 5673 7ff65325d73c 34 API calls 5670->5673 5672 7ff65325d3c0 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 5671->5672 5674 7ff65325d96b 5672->5674 5675 7ff65325d95a 5673->5675 5674->5655 5676 7ff65325d82c GetStdHandle GetFileType 5675->5676 5676->5671 5679 7ff653258ea1 5678->5679 5680 7ff65325911f 5678->5680 5682 7ff653259168 5679->5682 5686 7ff653259338 5680->5686 5683 7ff653259193 5682->5683 5684 7ff653259197 5683->5684 5685 7ff653259176 DeleteCriticalSection 5683->5685 5684->5662 5685->5683 5690 7ff6532591a0 5686->5690 5696 7ff6532592ba TlsFree 5690->5696 5697 7ff6532591e4 try_get_function 5690->5697 5691 7ff653259212 LoadLibraryExW 5693 7ff653259289 5691->5693 5694 7ff653259233 GetLastError 5691->5694 5692 7ff6532592a9 GetProcAddress 5692->5696 5693->5692 5695 7ff6532592a0 FreeLibrary 5693->5695 5694->5697 5695->5692 5697->5691 5697->5692 5697->5696 5698 7ff653259255 LoadLibraryExW 5697->5698 5698->5693 5698->5697 5700 7ff653257920 5699->5700 5716 7ff65325a2d4 5700->5716 5702 7ff65325792c 5722 7ff653257c04 5702->5722 5704 7ff653257999 5705 7ff653257ef4 7 API calls 5704->5705 5715 7ff6532579b5 5704->5715 5707 7ff6532579c5 5705->5707 5706 7ff653257944 _RTC_Initialize 5706->5704 5727 7ff653257db4 5706->5727 5707->5616 5709 7ff653257959 5730 7ff653259b20 5709->5730 5713 7ff65325796e 5714 7ff65325a3c0 34 API calls 5713->5714 5714->5704 5715->5616 5717 7ff65325a2e5 5716->5717 5718 7ff65325a2ed 5717->5718 5719 7ff65325ac90 _set_fmode 14 API calls 5717->5719 5718->5702 5720 7ff65325a2fc 5719->5720 5721 7ff65325b8fc _invalid_parameter_noinfo 31 API calls 5720->5721 5721->5718 5723 7ff653257c15 5722->5723 5726 7ff653257c1a __scrt_acquire_startup_lock 5722->5726 5724 7ff653257ef4 7 API calls 5723->5724 5723->5726 5725 7ff653257c8e 5724->5725 5726->5706 5764 7ff653257d78 5727->5764 5729 7ff653257dbd 5729->5709 5731 7ff653257965 5730->5731 5732 7ff653259b40 5730->5732 5731->5704 5763 7ff653257e8c InitializeSListHead 5731->5763 5733 7ff653259b48 5732->5733 5734 7ff653259b5e 5732->5734 5735 7ff65325ac90 _set_fmode 14 API calls 5733->5735 5736 7ff65325cd40 45 API calls 5734->5736 5737 7ff653259b4d 5735->5737 5738 7ff653259b63 5736->5738 5739 7ff65325b8fc _invalid_parameter_noinfo 31 API calls 5737->5739 5779 7ff65325c4f4 GetModuleFileNameW 5738->5779 5739->5731 5746 7ff653259bed 5749 7ff6532598fc 34 API calls 5746->5749 5747 7ff653259bd5 5748 7ff65325ac90 _set_fmode 14 API calls 5747->5748 5750 7ff653259bda 5748->5750 5755 7ff653259c09 5749->5755 5751 7ff65325b9dc __free_lconv_num 14 API calls 5750->5751 5753 7ff653259be8 5751->5753 5752 7ff653259c0f 5754 7ff65325b9dc __free_lconv_num 14 API calls 5752->5754 5753->5731 5754->5731 5755->5752 5756 7ff653259c3b 5755->5756 5757 7ff653259c54 5755->5757 5758 7ff65325b9dc __free_lconv_num 14 API calls 5756->5758 5759 7ff65325b9dc __free_lconv_num 14 API calls 5757->5759 5760 7ff653259c44 5758->5760 5759->5752 5761 7ff65325b9dc __free_lconv_num 14 API calls 5760->5761 5762 7ff653259c50 5761->5762 5762->5731 5765 7ff653257d92 5764->5765 5767 7ff653257d8b 5764->5767 5768 7ff65325a81c 5765->5768 5767->5729 5771 7ff65325a468 5768->5771 5778 7ff65325d36c EnterCriticalSection 5771->5778 5780 7ff65325c53a GetLastError 5779->5780 5781 7ff65325c54e 5779->5781 5803 7ff65325ac20 5780->5803 5783 7ff653259588 34 API calls 5781->5783 5784 7ff65325c57c 5783->5784 5789 7ff65325c58d 5784->5789 5808 7ff65325e4dc 5784->5808 5785 7ff653262500 _handle_error 8 API calls 5788 7ff653259b7a 5785->5788 5791 7ff6532598fc 5788->5791 5811 7ff65325c3e0 5789->5811 5790 7ff65325c547 5790->5785 5792 7ff65325993a 5791->5792 5795 7ff6532599a0 5792->5795 5825 7ff65325d0f0 5792->5825 5794 7ff653259a93 5797 7ff653259ac0 5794->5797 5795->5794 5796 7ff65325d0f0 34 API calls 5795->5796 5796->5795 5798 7ff653259b10 5797->5798 5799 7ff653259ad8 5797->5799 5798->5746 5798->5747 5799->5798 5800 7ff65325b964 _set_fmode 14 API calls 5799->5800 5801 7ff653259b06 5800->5801 5802 7ff65325b9dc __free_lconv_num 14 API calls 5801->5802 5802->5798 5804 7ff65325b554 _set_fmode 14 API calls 5803->5804 5805 7ff65325ac31 5804->5805 5806 7ff65325b554 _set_fmode 14 API calls 5805->5806 5807 7ff65325ac4a __free_lconv_num 5806->5807 5807->5790 5809 7ff65325e2b4 try_get_function 5 API calls 5808->5809 5810 7ff65325e4fc 5809->5810 5810->5789 5812 7ff65325c41d 5811->5812 5817 7ff65325c404 5811->5817 5813 7ff65325d188 WideCharToMultiByte 5812->5813 5819 7ff65325c422 5812->5819 5814 7ff65325c475 5813->5814 5816 7ff65325c47c GetLastError 5814->5816 5814->5819 5820 7ff65325c4a5 5814->5820 5815 7ff65325ac90 _set_fmode 14 API calls 5815->5817 5818 7ff65325ac20 14 API calls 5816->5818 5817->5790 5822 7ff65325c489 5818->5822 5819->5815 5819->5817 5821 7ff65325d188 WideCharToMultiByte 5820->5821 5823 7ff65325c4cc 5821->5823 5824 7ff65325ac90 _set_fmode 14 API calls 5822->5824 5823->5816 5823->5817 5824->5817 5826 7ff65325d078 5825->5826 5827 7ff653259588 34 API calls 5826->5827 5828 7ff65325d09c 5827->5828 5828->5792 5830 7ff653258057 GetStartupInfoW 5829->5830 5830->5597 5832 7ff6532571ae 5831->5832 5837 7ff653257207 5831->5837 5841 7ff653257268 HeapAlloc 5832->5841 5834 7ff653256de2 5834->5639 5835 7ff653257224 VirtualFree 5835->5837 5836 7ff653257235 HeapFree 5836->5837 5837->5834 5837->5835 5837->5836 5838 7ff6532571ec HeapFree 5839 7ff6532571c9 5838->5839 5839->5837 5839->5838 5843 7ff653256dec CreateEventW 5839->5843 5842 7ff653257297 5841->5842 5842->5839 5844 7ff653256e51 5843->5844 5845 7ff653256e11 WaitForSingleObject 5843->5845 5844->5838 5846 7ff653256e28 5845->5846 5847 7ff653256e48 CloseHandle 5846->5847 5848 7ff653257268 HeapAlloc 5846->5848 5847->5844 5848->5847 5850 7ff65325f10f 5849->5850 5858 7ff653260c00 5850->5858 5871 7ff65325d36c EnterCriticalSection 5858->5871 5873 7ff65325b3d8 34 API calls 5872->5873 5874 7ff65325a9e5 5873->5874 5875 7ff65325aa70 34 API calls 5874->5875 5876 7ff65325a9fb 5875->5876 5877 7ff65325a0f4 5878 7ff65325a15b 5877->5878 5879 7ff65325a111 GetModuleHandleW 5877->5879 5887 7ff653259fec 5878->5887 5879->5878 5885 7ff65325a11e 5879->5885 5882 7ff65325a19d 5884 7ff65325a1af 5885->5878 5901 7ff65325a1fc GetModuleHandleExW 5885->5901 5907 7ff65325d36c EnterCriticalSection 5887->5907 5889 7ff65325a008 5890 7ff65325a024 67 API calls 5889->5890 5891 7ff65325a011 5890->5891 5892 7ff65325d3c0 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 5891->5892 5893 7ff65325a019 5892->5893 5893->5882 5894 7ff65325a1b0 5893->5894 5908 7ff65325d3dc 5894->5908 5897 7ff65325a1ea 5899 7ff65325a1fc 3 API calls 5897->5899 5898 7ff65325a1d9 GetCurrentProcess TerminateProcess 5898->5897 5900 7ff65325a1f1 ExitProcess 5899->5900 5902 7ff65325a222 GetProcAddress 5901->5902 5903 7ff65325a241 5901->5903 5902->5903 5904 7ff65325a239 5902->5904 5905 7ff65325a24b FreeLibrary 5903->5905 5906 7ff65325a251 5903->5906 5904->5903 5905->5906 5906->5878 5909 7ff65325a1bd 5908->5909 5910 7ff65325d3fa 5908->5910 5909->5897 5909->5898 5912 7ff65325e48c 5910->5912 5913 7ff65325e2b4 try_get_function 5 API calls 5912->5913 5914 7ff65325e4b4 5913->5914 5914->5909 6102 7ff65325a8f4 6103 7ff65325a90d 6102->6103 6104 7ff65325a925 6102->6104 6103->6104 6105 7ff65325b9dc __free_lconv_num 14 API calls 6103->6105 6105->6104 6149 7ff65325bd34 6150 7ff65325bd5a 6149->6150 6157 7ff65325bd70 6149->6157 6151 7ff65325ac90 _set_fmode 14 API calls 6150->6151 6152 7ff65325bd5f 6151->6152 6154 7ff65325b8fc _invalid_parameter_noinfo 31 API calls 6152->6154 6153 7ff65325bddd 6156 7ff653259ac0 14 API calls 6153->6156 6155 7ff65325bd69 6154->6155 6161 7ff65325be50 6156->6161 6157->6153 6166 7ff65325bdd0 6157->6166 6170 7ff65325bf40 6157->6170 6159 7ff65325bec5 6160 7ff65325b9dc __free_lconv_num 14 API calls 6159->6160 6160->6166 6161->6159 6167 7ff65325bf28 6161->6167 6192 7ff65325f6f0 6161->6192 6162 7ff65325bf06 6164 7ff65325b9dc __free_lconv_num 14 API calls 6162->6164 6163 7ff65325b9dc __free_lconv_num 14 API calls 6163->6166 6164->6155 6166->6162 6166->6163 6168 7ff65325b91c _invalid_parameter_noinfo 17 API calls 6167->6168 6169 7ff65325bf3c 6168->6169 6171 7ff65325bf6e 6170->6171 6171->6171 6172 7ff65325b964 _set_fmode 14 API calls 6171->6172 6173 7ff65325bfb9 6172->6173 6174 7ff65325f6f0 31 API calls 6173->6174 6175 7ff65325bfef 6174->6175 6176 7ff65325b91c _invalid_parameter_noinfo 17 API calls 6175->6176 6177 7ff65325c0c6 6176->6177 6178 7ff653259588 34 API calls 6177->6178 6179 7ff65325c1a3 6178->6179 6180 7ff65325e4dc 5 API calls 6179->6180 6181 7ff65325c1d1 6180->6181 6201 7ff65325ba30 6181->6201 6184 7ff65325c254 6185 7ff653259588 34 API calls 6184->6185 6186 7ff65325c287 6185->6186 6187 7ff65325e4dc 5 API calls 6186->6187 6188 7ff65325c2af 6187->6188 6223 7ff65325bba8 6188->6223 6191 7ff65325bf40 39 API calls 6195 7ff65325f708 6192->6195 6193 7ff65325f70d 6194 7ff65325ac90 _set_fmode 14 API calls 6193->6194 6198 7ff65325f723 6193->6198 6200 7ff65325f717 6194->6200 6195->6193 6197 7ff65325f752 6195->6197 6195->6198 6196 7ff65325b8fc _invalid_parameter_noinfo 31 API calls 6196->6198 6197->6198 6199 7ff65325ac90 _set_fmode 14 API calls 6197->6199 6198->6161 6199->6200 6200->6196 6202 7ff65325ba7b 6201->6202 6203 7ff65325ba59 6201->6203 6204 7ff65325bad4 6202->6204 6205 7ff65325ba7f 6202->6205 6207 7ff65325b9dc __free_lconv_num 14 API calls 6203->6207 6214 7ff65325ba67 FindFirstFileExW 6203->6214 6206 7ff65325d12c MultiByteToWideChar 6204->6206 6208 7ff65325ba93 6205->6208 6210 7ff65325b9dc __free_lconv_num 14 API calls 6205->6210 6205->6214 6216 7ff65325baef 6206->6216 6207->6214 6211 7ff65325dcbc 15 API calls 6208->6211 6209 7ff65325baf6 GetLastError 6212 7ff65325ac20 14 API calls 6209->6212 6210->6208 6211->6214 6215 7ff65325bb03 6212->6215 6213 7ff65325bb2f 6213->6214 6218 7ff65325d12c MultiByteToWideChar 6213->6218 6214->6184 6219 7ff65325ac90 _set_fmode 14 API calls 6215->6219 6216->6209 6216->6213 6217 7ff65325bb23 6216->6217 6220 7ff65325b9dc __free_lconv_num 14 API calls 6216->6220 6221 7ff65325dcbc 15 API calls 6217->6221 6222 7ff65325bb77 6218->6222 6219->6214 6220->6217 6221->6213 6222->6209 6222->6214 6224 7ff65325bbf3 6223->6224 6225 7ff65325bbd1 6223->6225 6226 7ff65325bc4c 6224->6226 6227 7ff65325bbf8 6224->6227 6229 7ff65325b9dc __free_lconv_num 14 API calls 6225->6229 6236 7ff65325bbdf 6225->6236 6228 7ff65325d188 WideCharToMultiByte 6226->6228 6230 7ff65325bc0c 6227->6230 6232 7ff65325b9dc __free_lconv_num 14 API calls 6227->6232 6227->6236 6239 7ff65325bc70 6228->6239 6229->6236 6233 7ff65325dcbc 15 API calls 6230->6233 6231 7ff65325bc77 GetLastError 6234 7ff65325ac20 14 API calls 6231->6234 6232->6230 6233->6236 6237 7ff65325bc84 6234->6237 6235 7ff65325bcb2 6235->6236 6240 7ff65325d188 WideCharToMultiByte 6235->6240 6236->6191 6242 7ff65325ac90 _set_fmode 14 API calls 6237->6242 6238 7ff65325bca7 6244 7ff65325dcbc 15 API calls 6238->6244 6239->6231 6239->6235 6239->6238 6243 7ff65325b9dc __free_lconv_num 14 API calls 6239->6243 6241 7ff65325bd03 6240->6241 6241->6231 6241->6236 6242->6236 6243->6238 6244->6235 6245 7ff65325a934 6246 7ff65325b9dc __free_lconv_num 14 API calls 6245->6246 6247 7ff65325a944 6246->6247 6248 7ff65325b9dc __free_lconv_num 14 API calls 6247->6248 6249 7ff65325a958 6248->6249 6250 7ff65325b9dc __free_lconv_num 14 API calls 6249->6250 6251 7ff65325a96c 6250->6251 6252 7ff65325b9dc __free_lconv_num 14 API calls 6251->6252 6253 7ff65325a980 6252->6253 6279 7ff65325d974 6280 7ff65325d980 6279->6280 6282 7ff65325d9a7 6280->6282 6283 7ff65325d4c0 6280->6283 6284 7ff65325d4c5 6283->6284 6285 7ff65325d500 6283->6285 6286 7ff65325d4e6 DeleteCriticalSection 6284->6286 6287 7ff65325d4f8 6284->6287 6285->6280 6286->6286 6286->6287 6288 7ff65325b9dc __free_lconv_num 14 API calls 6287->6288 6288->6285 6038 7ff6532618b0 6039 7ff6532618c7 6038->6039 6040 7ff6532618c1 CloseHandle 6038->6040 6040->6039 5958 7ff653256e5c 5959 7ff653256e65 5958->5959 5960 7ff65325706f 5958->5960 5971 7ff6532572d8 5959->5971 5963 7ff653256ebd HeapAlloc 5963->5960 5965 7ff653256edb 5963->5965 5964 7ff653257061 HeapFree 5964->5960 5965->5964 5966 7ff653256fd4 HeapAlloc 5965->5966 5966->5964 5967 7ff653256fee 5966->5967 5968 7ff65325701f HeapAlloc 5967->5968 5968->5964 5969 7ff653257039 5968->5969 5970 7ff653257268 HeapAlloc 5969->5970 5970->5964 5972 7ff65325730a 5971->5972 5973 7ff653257321 HeapAlloc 5972->5973 5974 7ff653256eab 5973->5974 5976 7ff65325733d 5973->5976 5974->5960 5974->5963 5975 7ff6532574a4 HeapFree 5975->5974 5976->5975 6041 7ff65325709c 6042 7ff6532570cd 6041->6042 6043 7ff6532570a1 HeapAlloc 6041->6043 6043->6042 6254 7ff653257b1c 6255 7ff653258084 __scrt_is_managed_app GetModuleHandleW 6254->6255 6256 7ff653257b23 6255->6256 6044 7ff65325a89c 6047 7ff653259e98 6044->6047 6054 7ff653259e60 6047->6054 6052 7ff653259e1c 14 API calls 6053 7ff653259ec0 6052->6053 6055 7ff653259e75 6054->6055 6056 7ff653259e70 6054->6056 6058 7ff653259e7c 6055->6058 6057 7ff653259e1c 14 API calls 6056->6057 6057->6055 6059 7ff653259e8c 6058->6059 6060 7ff653259e91 6058->6060 6061 7ff653259e1c 14 API calls 6059->6061 6060->6052 6061->6060 6350 7ff6532579d8 6357 7ff6532580d8 SetUnhandledExceptionFilter 6350->6357 5977 7ff65325b258 5978 7ff65325b25d 5977->5978 5982 7ff65325b272 5977->5982 5983 7ff65325b278 5978->5983 5984 7ff65325b2ba 5983->5984 5985 7ff65325b2c2 5983->5985 5986 7ff65325b9dc __free_lconv_num 14 API calls 5984->5986 5987 7ff65325b9dc __free_lconv_num 14 API calls 5985->5987 5986->5985 5988 7ff65325b2cf 5987->5988 5989 7ff65325b9dc __free_lconv_num 14 API calls 5988->5989 5990 7ff65325b2dc 5989->5990 5991 7ff65325b9dc __free_lconv_num 14 API calls 5990->5991 5992 7ff65325b2e9 5991->5992 5993 7ff65325b9dc __free_lconv_num 14 API calls 5992->5993 5994 7ff65325b2f6 5993->5994 5995 7ff65325b9dc __free_lconv_num 14 API calls 5994->5995 5996 7ff65325b303 5995->5996 5997 7ff65325b9dc __free_lconv_num 14 API calls 5996->5997 5998 7ff65325b310 5997->5998 5999 7ff65325b9dc __free_lconv_num 14 API calls 5998->5999 6000 7ff65325b31d 5999->6000 6001 7ff65325b9dc __free_lconv_num 14 API calls 6000->6001 6002 7ff65325b32d 6001->6002 6003 7ff65325b9dc __free_lconv_num 14 API calls 6002->6003 6004 7ff65325b33d 6003->6004 6009 7ff65325b128 6004->6009 6023 7ff65325d36c EnterCriticalSection 6009->6023 6358 7ff6532621e2 RaiseException 6359 7ff6532621f9 6358->6359 6106 7ff65325e8e4 GetProcessHeap 6257 7ff65325d324 6258 7ff65325d32c 6257->6258 6260 7ff65325d35d 6258->6260 6261 7ff65325d359 6258->6261 6263 7ff65325e644 6258->6263 6268 7ff65325d388 6260->6268 6264 7ff65325e2b4 try_get_function 5 API calls 6263->6264 6265 7ff65325e67a 6264->6265 6266 7ff65325e684 6265->6266 6267 7ff65325e68f InitializeCriticalSectionAndSpinCount 6265->6267 6266->6258 6267->6266 6269 7ff65325d3b3 6268->6269 6270 7ff65325d3b7 6269->6270 6271 7ff65325d396 DeleteCriticalSection 6269->6271 6270->6261 6271->6269 6360 7ff65325efe4 6361 7ff65325f00e 6360->6361 6362 7ff65325b964 _set_fmode 14 API calls 6361->6362 6363 7ff65325f02d 6362->6363 6364 7ff65325b9dc __free_lconv_num 14 API calls 6363->6364 6365 7ff65325f03b 6364->6365 6366 7ff65325b964 _set_fmode 14 API calls 6365->6366 6370 7ff65325f065 6365->6370 6367 7ff65325f057 6366->6367 6369 7ff65325b9dc __free_lconv_num 14 API calls 6367->6369 6368 7ff65325e644 6 API calls 6368->6370 6369->6370 6370->6368 6371 7ff65325f06e 6370->6371 6107 7ff65325a0df 6108 7ff65325a9dc 34 API calls 6107->6108 6109 7ff65325a0e4 6108->6109 6025 7ff653258c60 6028 7ff653258c90 _IsNonwritableInCurrentImage __C_specific_handler __except_validate_context_record 6025->6028 6026 7ff653258d81 6027 7ff653258d4c RtlUnwindEx 6027->6028 6028->6026 6028->6027 6393 7ff65325b620 6400 7ff65325e518 6393->6400 6401 7ff65325e2b4 try_get_function 5 API calls 6400->6401 6402 7ff65325e540 TlsAlloc 6401->6402 6404 7ff65325e808 6405 7ff65325e841 6404->6405 6406 7ff65325e812 6404->6406 6406->6405 6407 7ff65325e827 FreeLibrary 6406->6407 6407->6406 6408 7ff653263008 6409 7ff653262fa6 6408->6409 6412 7ff6532634d4 6409->6412 6411 7ff653263054 6413 7ff6532634f9 6412->6413 6414 7ff65326364e 6413->6414 6415 7ff653263529 VirtualAlloc 6413->6415 6414->6411 6415->6414 6416 7ff65326354b 6415->6416 6417 7ff6532630f0 2 API calls 6416->6417 6419 7ff653263569 6417->6419 6418 7ff65326363a VirtualFree 6418->6414 6419->6418 6420 7ff653263585 VirtualAlloc 6419->6420 6420->6418 6422 7ff6532635a9 6420->6422 6421 7ff6532635e8 VirtualProtect 6421->6418 6422->6421 5915 7ff6532634d4 5916 7ff6532634f9 5915->5916 5917 7ff65326364e 5916->5917 5918 7ff653263529 VirtualAlloc 5916->5918 5918->5917 5919 7ff65326354b 5918->5919 5926 7ff6532630f0 VirtualAlloc 5919->5926 5921 7ff65326363a VirtualFree 5921->5917 5923 7ff653263585 VirtualAlloc 5923->5921 5925 7ff6532635a9 5923->5925 5924 7ff6532635e8 VirtualProtect 5924->5921 5925->5924 5927 7ff6532633ae 5926->5927 5929 7ff653263156 VirtualFree 5926->5929 5927->5921 5927->5923 5929->5927 6029 7ff65325fc50 6030 7ff65325fc58 6029->6030 6031 7ff65325fc6d 6030->6031 6032 7ff65325fc86 6030->6032 6033 7ff65325ac90 _set_fmode 14 API calls 6031->6033 6036 7ff653259588 34 API calls 6032->6036 6037 7ff65325fc7d 6032->6037 6034 7ff65325fc72 6033->6034 6035 7ff65325b8fc _invalid_parameter_noinfo 31 API calls 6034->6035 6035->6037 6036->6037 6303 7ff65325a390 6306 7ff65325a314 6303->6306 6313 7ff65325d36c EnterCriticalSection 6306->6313 6110 7ff6532612bb 6111 7ff6532612fb 6110->6111 6112 7ff653261560 6110->6112 6111->6112 6113 7ff653261542 6111->6113 6114 7ff65326132f 6111->6114 6116 7ff653261e40 _log10_special 22 API calls 6112->6116 6117 7ff653261556 6112->6117 6118 7ff653261e40 6113->6118 6116->6117 6121 7ff653261e60 6118->6121 6122 7ff653261e7a 6121->6122 6123 7ff653261e5b 6122->6123 6125 7ff653261ca4 6122->6125 6123->6117 6126 7ff653261ce4 _raise_exc _handle_error 6125->6126 6127 7ff653261d8d 6126->6127 6128 7ff653261d5d 6126->6128 6138 7ff653262298 6127->6138 6134 7ff653261b80 6128->6134 6131 7ff653261d8b _handle_error 6132 7ff653262500 _handle_error 8 API calls 6131->6132 6133 7ff653261db5 6132->6133 6133->6123 6135 7ff653261bc4 _handle_error 6134->6135 6136 7ff653261bd9 6135->6136 6137 7ff653262298 _set_errno_from_matherr 14 API calls 6135->6137 6136->6131 6137->6136 6139 7ff6532622b6 6138->6139 6140 7ff6532622a1 6138->6140 6142 7ff65325ac90 _set_fmode 14 API calls 6139->6142 6141 7ff6532622ae 6140->6141 6143 7ff65325ac90 _set_fmode 14 API calls 6140->6143 6141->6131 6142->6141 6143->6141 6144 7ff653262abc 6145 7ff653262acb 6144->6145 6146 7ff653262ad5 6144->6146 6148 7ff65325d3c0 LeaveCriticalSection 6145->6148 6314 7ff653262976 6315 7ff6532629f9 6314->6315 6316 7ff65326298e 6314->6316 6316->6315 6317 7ff653258fec 43 API calls 6316->6317 6318 7ff6532629db 6317->6318 6319 7ff653258fec 43 API calls 6318->6319 6320 7ff6532629f0 6319->6320 6321 7ff65325a9dc 34 API calls 6320->6321 6321->6315 6322 7ff65325f178 6323 7ff65325f1a0 6322->6323 6328 7ff65325f1ae 6322->6328 6324 7ff653259588 34 API calls 6323->6324 6323->6328 6325 7ff65325f1cc 6324->6325 6326 7ff65325f1da 6325->6326 6327 7ff65325f1fc 6325->6327 6338 7ff653260d54 6326->6338 6327->6328 6341 7ff65325ab8c 6327->6341 6332 7ff65325f292 6333 7ff65325d12c MultiByteToWideChar 6332->6333 6334 7ff65325f275 6333->6334 6334->6328 6336 7ff65325ac90 _set_fmode 14 API calls 6334->6336 6335 7ff65325f240 6335->6334 6337 7ff65325d12c MultiByteToWideChar 6335->6337 6336->6328 6337->6334 6344 7ff6532610d0 6338->6344 6342 7ff653259588 34 API calls 6341->6342 6343 7ff65325ab9f 6342->6343 6343->6332 6343->6335 6346 7ff65326112d 6344->6346 6349 7ff653261139 6344->6349 6345 7ff653262500 _handle_error 8 API calls 6348 7ff653260d67 6345->6348 6346->6345 6347 7ff65325ac90 _set_fmode 14 API calls 6347->6346 6348->6328 6349->6346 6349->6347 6272 7ff65325d104 GetCommandLineA GetCommandLineW 6372 7ff65325f7c4 6373 7ff65325f7e3 6372->6373 6374 7ff65325f85c 6373->6374 6377 7ff65325f7f3 6373->6377 6380 7ff653262628 6374->6380 6378 7ff653262500 _handle_error 8 API calls 6377->6378 6379 7ff65325f852 6378->6379 6383 7ff65326263c IsProcessorFeaturePresent 6380->6383 6384 7ff653262653 6383->6384 6389 7ff6532626d8 RtlCaptureContext RtlLookupFunctionEntry 6384->6389 6390 7ff653262667 6389->6390 6391 7ff653262708 RtlVirtualUnwind 6389->6391 6392 7ff653262520 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6390->6392 6391->6390 6423 7ff653263001 6424 7ff653263006 6423->6424 6425 7ff6532634d4 6 API calls 6424->6425 6426 7ff653263054 6425->6426 6289 7ff65325f340 6290 7ff65325f36d 6289->6290 6291 7ff65325ac90 _set_fmode 14 API calls 6290->6291 6296 7ff65325f382 6290->6296 6292 7ff65325f377 6291->6292 6294 7ff65325b8fc _invalid_parameter_noinfo 31 API calls 6292->6294 6293 7ff653262500 _handle_error 8 API calls 6295 7ff65325f6df 6293->6295 6294->6296 6296->6293 6297 7ff653262940 6300 7ff6532596e8 6297->6300 6301 7ff65325b554 _set_fmode 14 API calls 6300->6301 6302 7ff653259706 6301->6302

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  • @MwvjmsssuXdXof|-Oijay8RtZoaKmRSqYEfJR95U8ooEWGNL2yghtGrf1pDTEdEHybyCpYmNtya0OXgJFO2YMIWgFzMb5hOIsb71LurFHqz|rTdaWW|VFn-TqXuCwXFZO6MScUyzkKjjTJPEvdCpCcHon4tRviUUaTRTEZGL9lZfSq19qUkY-6-5jINvihEFHkBNynR|UPNWLa35Ff9xIj-jep0HTbiM3xaO73j454k4P|0SrTQVmav7a7I8zcx5sSQ, xrefs: 00007FF65325713F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Heap$Free$Alloc$ProcessVirtual
                                  • String ID: @MwvjmsssuXdXof|-Oijay8RtZoaKmRSqYEfJR95U8ooEWGNL2yghtGrf1pDTEdEHybyCpYmNtya0OXgJFO2YMIWgFzMb5hOIsb71LurFHqz|rTdaWW|VFn-TqXuCwXFZO6MScUyzkKjjTJPEvdCpCcHon4tRviUUaTRTEZGL9lZfSq19qUkY-6-5jINvihEFHkBNynR|UPNWLa35Ff9xIj-jep0HTbiM3xaO73j454k4P|0SrTQVmav7a7I8zcx5sSQ
                                  • API String ID: 3808331028-4183760664
                                  • Opcode ID: ffec2f7ca3fda931088bd7f6c107aab2ba0ee423a3ec41db2acfc84ea1e83538
                                  • Instruction ID: 831d0deb9e2a29bcb6ceca912fdf037997edc79439264bf28c7fbfb2dbeb1a16
                                  • Opcode Fuzzy Hash: ffec2f7ca3fda931088bd7f6c107aab2ba0ee423a3ec41db2acfc84ea1e83538
                                  • Instruction Fuzzy Hash: 6A411932715F4199EB10CF65E9812AC73A6FB48F88F488436DA4CA7B18DF38D616C380
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Information$Query$CloseHandleSystem$ProcessToken
                                  • String ID:
                                  • API String ID: 2024103940-0
                                  • Opcode ID: c3f3c76c8b2be0d7d44dc3ee33c48ea8b0372aa6c5604e5390e5033e47f04c12
                                  • Instruction ID: 39884f0567f69306464a44efc432e3976b398e54d39d35a98f6c75c19cf7ffdc
                                  • Opcode Fuzzy Hash: c3f3c76c8b2be0d7d44dc3ee33c48ea8b0372aa6c5604e5390e5033e47f04c12
                                  • Instruction Fuzzy Hash: CE71C430B18A098FEB94EF68D8657EE73D5FB94340F400529E847CB591EE36EC958782
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoSystem
                                  • String ID: 0$@
                                  • API String ID: 31276548-1545510068
                                  • Opcode ID: a88bb02aead4fe52cd93ba064d7017a54b9761c38897babe54b5f79178871d7e
                                  • Instruction ID: 3c15993ea5da76fecd4b0f72ecf19e06a82fd4218e15fe3e4b668554569f740a
                                  • Opcode Fuzzy Hash: a88bb02aead4fe52cd93ba064d7017a54b9761c38897babe54b5f79178871d7e
                                  • Instruction Fuzzy Hash: 2931D53021CF4C8FEB55EB18DCA97AAB3D1F7D4340F548A2AE04AC7580DA65E8848783
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InformationQuery$System$Processmalloc
                                  • String ID:
                                  • API String ID: 1267391693-0
                                  • Opcode ID: 0766fc6635dd31053b727816442fefa633829422fb4b59d36c68c8cec887e78a
                                  • Instruction ID: 63ca2f3b294360867881963ebc0280f59078d6695799f89e7a8ff23b119b5866
                                  • Opcode Fuzzy Hash: 0766fc6635dd31053b727816442fefa633829422fb4b59d36c68c8cec887e78a
                                  • Instruction Fuzzy Hash: CE31BB7130CA084FEB68F77CDC697B933C5E795311F004029D94AC7592EE25EC438686
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeviceDriveLogicalQueryStrings
                                  • String ID:
                                  • API String ID: 3173366581-0
                                  • Opcode ID: 44ebf3bb3f659db2baf1671957d6035b84d40f7447c0330e21c1dfb288bbfcca
                                  • Instruction ID: 7a13413384b10a75cfb42bc04418c5d776b29f9dbc0d1671f2afb37a75cf371b
                                  • Opcode Fuzzy Hash: 44ebf3bb3f659db2baf1671957d6035b84d40f7447c0330e21c1dfb288bbfcca
                                  • Instruction Fuzzy Hash: 07318271518A488BEB61DB14D898BFA73E2FB94301F40451AE48AC7190EF79ED84C783
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: malloc
                                  • String ID:
                                  • API String ID: 2803490479-0
                                  • Opcode ID: b6ed53fab85cf22cf76427c2e966a0a197060846b061c1a52c71d60efdb2ca86
                                  • Instruction ID: 2d9b16b1744fbbbb1d473814ce276a27e06ee94c0be8d77a09f26d50396622bc
                                  • Opcode Fuzzy Hash: b6ed53fab85cf22cf76427c2e966a0a197060846b061c1a52c71d60efdb2ca86
                                  • Instruction Fuzzy Hash: 6A9169316089484BE76CDF28C8A93F977D1F785305F18822ED4DBCB682DA76E5478782
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InformationProcessQuery
                                  • String ID:
                                  • API String ID: 1778838933-0
                                  • Opcode ID: aedaa32b066cd7baad790dc79b89f0f0aa25ff69fa0ea66035def9c6c87aec9e
                                  • Instruction ID: 0e7aaecfcaf4aee8fc1d9cb5347997e3540e7fefdfdb9c197362bd4da14489ce
                                  • Opcode Fuzzy Hash: aedaa32b066cd7baad790dc79b89f0f0aa25ff69fa0ea66035def9c6c87aec9e
                                  • Instruction Fuzzy Hash: 75018430628A094FEB45EB78D8A4BE677E4F755300F404929A49ACB991EF36E941CB41
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Value$CloseCreateOpenQuery
                                  • String ID: @$@
                                  • API String ID: 980562271-149943524
                                  • Opcode ID: 62d38529be31c1c4406cadae21aaf7dda888b7df0d9feabcaf499976726d02fa
                                  • Instruction ID: 1de93828a0f7ef89887aaa9cd744f16fd8aff3260389f1384328bb1befdf0121
                                  • Opcode Fuzzy Hash: 62d38529be31c1c4406cadae21aaf7dda888b7df0d9feabcaf499976726d02fa
                                  • Instruction Fuzzy Hash: 62518131608B4C4FE754EF68D8996ABB7D1FB94301F404A2EE48AC3651DF75E8458B82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Read$CreatePointer
                                  • String ID: MZ$PE
                                  • API String ID: 4132024448-1102611028
                                  • Opcode ID: ed02993aad010b8f0ed0d0dc1b69872bc261ae90b3cbae546a6cddcfd68a01dd
                                  • Instruction ID: 222d303221fb5e77a9bfdee0ea3f4b4040d22447329e993cdb0972e50da16512
                                  • Opcode Fuzzy Hash: ed02993aad010b8f0ed0d0dc1b69872bc261ae90b3cbae546a6cddcfd68a01dd
                                  • Instruction Fuzzy Hash: 7561D930A189484FEB74EF18D8987A9BBD2F798301F508519E48EC79D5DB39ED818783
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1459624139.00007FF653263000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF653263000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_7ff653263000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Virtual$Alloc$Free$Protect
                                  • String ID: ,
                                  • API String ID: 1004437363-3772416878
                                  • Opcode ID: 8a57ff5ef109ebab1fcadb133502250ce132c3a796e799e615fc61f91456b295
                                  • Instruction ID: 1ddbeb74addc145dd50a19706e3d02927c8c7f5d82d741bc622f0ca9ba827dd5
                                  • Opcode Fuzzy Hash: 8a57ff5ef109ebab1fcadb133502250ce132c3a796e799e615fc61f91456b295
                                  • Instruction Fuzzy Hash: 3951A03061CE095BDB94EF5CD886669B7E1FF88710F14422EE98ED3255DE74E8428BC2

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Virtual$Alloc$Free$Protect
                                  • String ID: ,
                                  • API String ID: 1004437363-3772416878
                                  • Opcode ID: 8a57ff5ef109ebab1fcadb133502250ce132c3a796e799e615fc61f91456b295
                                  • Instruction ID: 25287e939a82960ef8f02a8934ce06c50721c5bb372b7d9d3b2f5f546af8e079
                                  • Opcode Fuzzy Hash: 8a57ff5ef109ebab1fcadb133502250ce132c3a796e799e615fc61f91456b295
                                  • Instruction Fuzzy Hash: 3541B232725A8197DB508F61E60166EB7A1FB48BC8F588035EF8967B58DF3CE456CB00

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 4144305933-0
                                  • Opcode ID: 239fa3bebcd99b01550fb1fc86b179cf929df85b8219cbec58508aef85af2048
                                  • Instruction ID: 687eb320b68b6f1775f89332d787bec9a70de1241638d31b7c319cb3270c11a5
                                  • Opcode Fuzzy Hash: 239fa3bebcd99b01550fb1fc86b179cf929df85b8219cbec58508aef85af2048
                                  • Instruction Fuzzy Hash: 62317E21EACE4745FA54AB6896933B92293AF41F44F4C4035E60DFF6DBCE6DAB048341

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: String$try_get_function
                                  • String ID: LCMapStringEx
                                  • API String ID: 1203122356-3893581201
                                  • Opcode ID: af8085b891c7a8c85f404577558a79ae226ce3317dbad8c3cde87e2ea14cdc23
                                  • Instruction ID: 4df8992adaaa3b1c095ed5796103caeb4ee48184e814eec827d89436def6c84a
                                  • Opcode Fuzzy Hash: af8085b891c7a8c85f404577558a79ae226ce3317dbad8c3cde87e2ea14cdc23
                                  • Instruction Fuzzy Hash: D0116D3661CB8086D760CB06F5502AAB7A5FBC8F80F084136EE8DA7B19CF3CD5008B40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: free$CloseHandle
                                  • String ID: ,
                                  • API String ID: 4080011421-3772416878
                                  • Opcode ID: 19bd0e1f4c380038fc96e62ce33c6398c15e8ead9e9bc0b200304ba1120fbf6f
                                  • Instruction ID: 107528cce1ccdf9c794d0e840e92064fe36603e129cad2c6944bf87191d671b1
                                  • Opcode Fuzzy Hash: 19bd0e1f4c380038fc96e62ce33c6398c15e8ead9e9bc0b200304ba1120fbf6f
                                  • Instruction Fuzzy Hash: 1751F93060CB094FEB54EB68D895BEAB7E1FB85310F00452DE48AC7682DF75E881CB91

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: AllocCloseCreateEventHandleHeapObjectSingleWait
                                  • String ID:
                                  • API String ID: 783827187-0
                                  • Opcode ID: 644ddf22212b834a51ea26004649eb9547d4a257742e84c31f5b786d9dd8d01a
                                  • Instruction ID: 683292cd43996575d24c3237050432d4d7e5ff710f8249dd32c19d6e2ea8d9b9
                                  • Opcode Fuzzy Hash: 644ddf22212b834a51ea26004649eb9547d4a257742e84c31f5b786d9dd8d01a
                                  • Instruction Fuzzy Hash: DBF06815F29F4252EB089B66F65257A2292BF48F80F4C9034DE0DFBB54DE3CD5508740

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 8abf4a66fd6ec3af08326f29549bedd682d7d032cbb87afc8a756cf6b92e9c95
                                  • Instruction ID: 130dc118427620dcd036c35cf87c8929bc011e039a8f1442c717e367f2c21b38
                                  • Opcode Fuzzy Hash: 8abf4a66fd6ec3af08326f29549bedd682d7d032cbb87afc8a756cf6b92e9c95
                                  • Instruction Fuzzy Hash: 0BE04F20B24B4182EA146B619E973792393BF88F51F088438C90EF6366CE7DE5488741
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: NJI@
                                  • API String ID: 0-1894075864
                                  • Opcode ID: d45665fd503c042bbd1cddf3e76509b083df421fb529cf4e6337dc35805fb2d8
                                  • Instruction ID: f5ea887e4bf55f32ecc88af26e278d0e0e7ef854e44250aceea9847d17774d4e
                                  • Opcode Fuzzy Hash: d45665fd503c042bbd1cddf3e76509b083df421fb529cf4e6337dc35805fb2d8
                                  • Instruction Fuzzy Hash: A0E12A7051C7D48BD775DB29D8A53EBBBE0EB89702F00492EE8CAC2291DB349545CB83

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Info
                                  • String ID:
                                  • API String ID: 1807457897-3916222277
                                  • Opcode ID: 3f71224608e4c15853494aec550443e5827c5ec106aa102962dece8a9ab28ad8
                                  • Instruction ID: 951dcfe4a6d93cfcf4e89fcae17ab361c1dd84edd9a89f64302fef2631e387ee
                                  • Opcode Fuzzy Hash: 3f71224608e4c15853494aec550443e5827c5ec106aa102962dece8a9ab28ad8
                                  • Instruction Fuzzy Hash: AD51E832A2DAD186E720CF24D1853AD7BA1F748F44F584135D68DABA89DF3CD645CB80

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 159 7ff65325e48c-7ff65325e4af call 7ff65325e2b4 161 7ff65325e4b4-7ff65325e4b7 159->161 162 7ff65325e4b9-7ff65325e4c8 161->162 163 7ff65325e4cf-7ff65325e4d9 161->163 162->163
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: try_get_function
                                  • String ID: AppPolicyGetProcessTerminationMethod
                                  • API String ID: 2742660187-2031265017
                                  • Opcode ID: 6263c985e4631a55b9a67bd19f886454219f1b2fdfa876558e5a5be93dbd6e19
                                  • Instruction ID: 3dc867c132a5fc4cdda4b756d63a6425db13fde77eb789e4c63cd8f33019482e
                                  • Opcode Fuzzy Hash: 6263c985e4631a55b9a67bd19f886454219f1b2fdfa876558e5a5be93dbd6e19
                                  • Instruction Fuzzy Hash: 4BE04F51E29D1691FE1447A1A9621F01256AF08BB0F4C4331DA3CBF3D49E2CA9948300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CreateMappingView
                                  • String ID:
                                  • API String ID: 3452162329-0
                                  • Opcode ID: c601f1478ab9137d9275349cd9da242e2fbd05faee214597b51a1edf8909ebdf
                                  • Instruction ID: 28b3121dc24c396d5eb30ac77a6d5ea255746709d9552efb1ec8894abca8e0f9
                                  • Opcode Fuzzy Hash: c601f1478ab9137d9275349cd9da242e2fbd05faee214597b51a1edf8909ebdf
                                  • Instruction Fuzzy Hash: C5C1D630618B084FEB59EF28D8957EA77D1FB94300F50462EE48AC7696EF35E8428781
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID: !RHY
                                  • API String ID: 2962429428-2095432132
                                  • Opcode ID: 5659b273bb457ee165c724c5c9c0f327e16e2d5a38eceb2e111579f9ff9e501c
                                  • Instruction ID: 07966c51a86383cc8553d8ac7c0b8ea62ad2c497c26bff3eefeb4e4276168a70
                                  • Opcode Fuzzy Hash: 5659b273bb457ee165c724c5c9c0f327e16e2d5a38eceb2e111579f9ff9e501c
                                  • Instruction Fuzzy Hash: C5A19235118B498FEB69EF29C8A57EA77E1FB95304F04051DE8C6CB592EB31E881C742

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 164 7ff65325cdbc-7ff65325cded call 7ff65325c7d0 167 7ff65325d046-7ff65325d049 call 7ff65325c850 164->167 168 7ff65325cdf3-7ff65325ce00 164->168 171 7ff65325d04e 167->171 170 7ff65325ce03-7ff65325ce05 168->170 172 7ff65325ce0b-7ff65325ce16 170->172 173 7ff65325cf59-7ff65325cf86 call 7ff653258a50 170->173 174 7ff65325d050-7ff65325d074 call 7ff653262500 171->174 172->170 175 7ff65325ce18-7ff65325ce1e 172->175 183 7ff65325cf89-7ff65325cf8f 173->183 178 7ff65325ce24-7ff65325ce2f IsValidCodePage 175->178 179 7ff65325cf51-7ff65325cf54 175->179 178->179 182 7ff65325ce35-7ff65325ce3c 178->182 179->174 184 7ff65325ce6c-7ff65325ce7b GetCPInfo 182->184 185 7ff65325ce3e-7ff65325ce4c 182->185 186 7ff65325cfcf-7ff65325cfd9 183->186 187 7ff65325cf91-7ff65325cf94 183->187 191 7ff65325cf45-7ff65325cf4b 184->191 192 7ff65325ce81-7ff65325cea1 call 7ff653258a50 184->192 189 7ff65325ce50-7ff65325ce62 call 7ff65325c8e0 185->189 186->183 188 7ff65325cfdb-7ff65325cfe7 186->188 187->186 190 7ff65325cf96-7ff65325cfa1 187->190 194 7ff65325cfe9-7ff65325cfec 188->194 195 7ff65325d012 188->195 203 7ff65325ce67 189->203 197 7ff65325cfc7-7ff65325cfcd 190->197 198 7ff65325cfa3 190->198 191->167 191->179 206 7ff65325cf3b 192->206 207 7ff65325cea7-7ff65325ceb0 192->207 200 7ff65325d009-7ff65325d010 194->200 201 7ff65325cfee-7ff65325cff1 194->201 202 7ff65325d019-7ff65325d02c 195->202 197->186 197->187 204 7ff65325cfa7-7ff65325cfae 198->204 200->202 208 7ff65325cff3-7ff65325cff5 201->208 209 7ff65325d000-7ff65325d007 201->209 210 7ff65325d030-7ff65325d03f 202->210 203->171 204->197 205 7ff65325cfb0-7ff65325cfc5 204->205 205->197 205->204 213 7ff65325cf3d-7ff65325cf40 206->213 211 7ff65325ceb2-7ff65325ceb5 207->211 212 7ff65325cede-7ff65325cee2 207->212 208->202 214 7ff65325cff7-7ff65325cffe 208->214 209->202 210->210 215 7ff65325d041 210->215 211->212 216 7ff65325ceb7-7ff65325cec0 211->216 217 7ff65325cee7-7ff65325cef0 212->217 213->189 214->202 215->167 218 7ff65325ced6-7ff65325cedc 216->218 219 7ff65325cec2-7ff65325cec7 216->219 217->217 220 7ff65325cef2-7ff65325cefb 217->220 218->211 218->212 221 7ff65325ceca-7ff65325ced4 219->221 222 7ff65325cf2b 220->222 223 7ff65325cefd-7ff65325cf00 220->223 221->218 221->221 224 7ff65325cf32-7ff65325cf39 222->224 225 7ff65325cf22-7ff65325cf29 223->225 226 7ff65325cf02-7ff65325cf05 223->226 224->213 225->224 227 7ff65325cf07-7ff65325cf09 226->227 228 7ff65325cf19-7ff65325cf20 226->228 229 7ff65325cf0b-7ff65325cf0e 227->229 230 7ff65325cf10-7ff65325cf17 227->230 228->224 229->224 230->224
                                  APIs
                                    • Part of subcall function 00007FF65325C7D0: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,00007FF65325CAF4,?,?,?,?,00000000,?,?,00007FF65325CD92), ref: 00007FF65325C7FA
                                  • IsValidCodePage.KERNEL32(?,00000000,?,?,00000000,00000001,?,00007FF65325CBA7,?,?,?,?,00000000,?,?,00007FF65325CD92), ref: 00007FF65325CE27
                                  • GetCPInfo.KERNEL32(?,00000000,?,?,00000000,00000001,?,00007FF65325CBA7,?,?,?,?,00000000,?,?,00007FF65325CD92), ref: 00007FF65325CE73
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: CodeInfoPageValid
                                  • String ID:
                                  • API String ID: 546120528-0
                                  • Opcode ID: 8a3f489a8328c28afbf6ceda6e6246556f8b933230f98b1c11e8daba2fcfd524
                                  • Instruction ID: 76514061b4c798a9076a6b564935e8ab56152cf0877466b3f9b73f6227f54044
                                  • Opcode Fuzzy Hash: 8a3f489a8328c28afbf6ceda6e6246556f8b933230f98b1c11e8daba2fcfd524
                                  • Instruction Fuzzy Hash: BE811663A2DA9296F7258F25D61217977A3AB40F40F4C4036D68EFB698EE3CE641C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Virtual$ErrorFreeFunctionModeProtectTable
                                  • String ID:
                                  • API String ID: 3431440644-0
                                  • Opcode ID: c558a3bee63eb8d82cfee7bb6036631f102c00f5edc4b5b2d839b26d2bc08f01
                                  • Instruction ID: 48b9964f4e9cecdf783d00345bf302a7590b4b67c172ee0476dff5ceb0f7c505
                                  • Opcode Fuzzy Hash: c558a3bee63eb8d82cfee7bb6036631f102c00f5edc4b5b2d839b26d2bc08f01
                                  • Instruction Fuzzy Hash: A631A630218A484BEF45FB29D8A5BE973D5FB95340F500519F44ACB697DE25E980C782
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InformationToken
                                  • String ID:
                                  • API String ID: 4114910276-0
                                  • Opcode ID: 0588b5df070fd58e483b9259e8b7792c754254eeb870b8f27a2360e8991485ad
                                  • Instruction ID: 85ff034cfca8023b5d6441a1fb07e81db32d1ffba678769067c7bcbb2d91680b
                                  • Opcode Fuzzy Hash: 0588b5df070fd58e483b9259e8b7792c754254eeb870b8f27a2360e8991485ad
                                  • Instruction Fuzzy Hash: B2118630208A498FDB44EF64D8D8A6AB7E2FBD4306F14492DE5C6C7268DF34E945CB42

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                                  • String ID:
                                  • API String ID: 3548387204-0
                                  • Opcode ID: f1733bcbe296f5e8f0a18ef71bd53c77051ff89a7b50ea6f0b86fdeadd363ee0
                                  • Instruction ID: 3952cca5bfd3a6bf3191b44e41a5fe3469b4f993db0725d448558b9df9fbe806
                                  • Opcode Fuzzy Hash: f1733bcbe296f5e8f0a18ef71bd53c77051ff89a7b50ea6f0b86fdeadd363ee0
                                  • Instruction Fuzzy Hash: 8A119D10EE8A4341FA0573B946972B822834F55B40F4C0474E60DFE2DBEE2CBB4147A2

                                  Control-flow Graph

                                  APIs
                                  • RtlFreeHeap.NTDLL(?,?,?,00007FF65325DB68,?,?,?,00007FF65325DBAB,?,?,?,00007FF65325E100,?,?,?,00007FF65325E033), ref: 00007FF65325B9F2
                                  • GetLastError.KERNEL32(?,?,?,00007FF65325DB68,?,?,?,00007FF65325DBAB,?,?,?,00007FF65325E100,?,?,?,00007FF65325E033), ref: 00007FF65325BA04
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 485612231-0
                                  • Opcode ID: c1b03068c222eda05010605960278460d8367b9c334bb969e5d38d61d6c62628
                                  • Instruction ID: e01eac42e75a955abd6734672d9c3af84b61686b56f596542779fe16bf299d9b
                                  • Opcode Fuzzy Hash: c1b03068c222eda05010605960278460d8367b9c334bb969e5d38d61d6c62628
                                  • Instruction Fuzzy Hash: 2EE08C10E29D0342FF19ABF29A0727816D37F55F41F0C4030C90DFA256EE2CA5814381
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1459624139.00007FF653263000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF653263000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_7ff653263000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                                  • Instruction ID: 32a600ee22e90c925f1c2977e337a2de58638fcf1dffde85eeec62883512b08e
                                  • Opcode Fuzzy Hash: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                                  • Instruction Fuzzy Hash: 0091A27061CB818FD3A0CB58C585A2ABBE1FF89708F58096DF5C9E7291DB35E9409B06

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 293 7ff6532630f0-7ff653263150 VirtualAlloc 294 7ff653263156-7ff65326315e 293->294 295 7ff6532633ae-7ff6532633b6 293->295 296 7ff65326316b-7ff653263173 294->296 297 7ff653263185-7ff65326318d 296->297 298 7ff653263175-7ff653263183 296->298 299 7ff653263195-7ff6532631aa 297->299 298->296 301 7ff6532631ac-7ff6532631b7 299->301 302 7ff6532631df-7ff6532631e8 299->302 303 7ff6532631b9 301->303 304 7ff6532631be-7ff6532631db 301->304 305 7ff65326327b-7ff653263286 302->305 306 7ff6532631ee-7ff6532631f9 302->306 307 7ff653263399-7ff6532633ab VirtualFree 303->307 304->302 310 7ff65326328d-7ff65326329b 305->310 311 7ff653263288 305->311 308 7ff6532631fb 306->308 309 7ff653263200-7ff653263232 306->309 307->295 308->307 312 7ff653263239-7ff653263276 309->312 313 7ff653263234 309->313 314 7ff65326329d 310->314 315 7ff6532632a2-7ff653263302 310->315 311->307 316 7ff653263394 312->316 313->307 314->307 317 7ff65326330f-7ff653263317 315->317 316->299 317->316 318 7ff653263319-7ff653263362 317->318 319 7ff653263366-7ff65326338f 318->319 320 7ff653263364 318->320 319->317 320->316
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                                  • Instruction ID: 13fd1aed22e76028b3a354959b57157765621674625b35a7db0b4b1e76ee5132
                                  • Opcode Fuzzy Hash: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                                  • Instruction Fuzzy Hash: AA81C47252CA818BD360CB19E58162ABBB1FB89B48F180125F7CAD7B58DF3DD9509F00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 2cfda130ca864b08787e99a1628f67eedfe46d1a9f14ab55541b67a143a70abc
                                  • Instruction ID: a2ee4c3b95c01dde7d0503dacff9e6fcbf9e505cf472e5e10c4b38dd3e07aee4
                                  • Opcode Fuzzy Hash: 2cfda130ca864b08787e99a1628f67eedfe46d1a9f14ab55541b67a143a70abc
                                  • Instruction Fuzzy Hash: 6251A370608B088FF7A5DF29C8993EAB7E5FB94301F40092EA18AC7560DB35D540CB06

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: HandleModule$AddressFreeLibraryProc
                                  • String ID:
                                  • API String ID: 3947729631-0
                                  • Opcode ID: 436df6279ab1ad4208babf28b275d30338b82d574ca1079f460148a5cab02ddc
                                  • Instruction ID: 821eb7017e83bc374983f81e008a4b61981efc8498166ab9a559141837e60920
                                  • Opcode Fuzzy Hash: 436df6279ab1ad4208babf28b275d30338b82d574ca1079f460148a5cab02ddc
                                  • Instruction Fuzzy Hash: 9E214131A24B01C9EB518F64D5462AC36E1EB48B08F488536D61DA6B89EF38DA85CB80

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: e9b6c901bd1bfc25192b9065b744bd2d6ffe4659ed36b92da970d31d47d2e5a5
                                  • Instruction ID: 6d508443fc73c327d793b4d117255169438254a85c539923fb9bd59d1e6bf7d9
                                  • Opcode Fuzzy Hash: e9b6c901bd1bfc25192b9065b744bd2d6ffe4659ed36b92da970d31d47d2e5a5
                                  • Instruction Fuzzy Hash: BC116D32938E8292F3109F14A64216963A6FF80F44F5D0534E65DFB6AACE3CFA118B00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 0ef85e6c49b167f6fa9e03bb0202aec9cadee554545795ea33251ab7e92968d2
                                  • Instruction ID: 8359ca55a058ac12445a5f734b4795de5d823166e03fbd45b0a7122eaaf3582a
                                  • Opcode Fuzzy Hash: 0ef85e6c49b167f6fa9e03bb0202aec9cadee554545795ea33251ab7e92968d2
                                  • Instruction Fuzzy Hash: 1F01C830324A084FEB54EB39C4567FA73D5F755305F50446AA48EC7182EA25D984C742
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FunctionTable
                                  • String ID:
                                  • API String ID: 1252446317-0
                                  • Opcode ID: 36ebb8551405ab402fb9baea8a3cc074c161fc2652fbf5a3c18d23fc79acd59a
                                  • Instruction ID: 15f8fd5b7751e02467d013b4f6c044c09437479e3d9da04708722429da8e2635
                                  • Opcode Fuzzy Hash: 36ebb8551405ab402fb9baea8a3cc074c161fc2652fbf5a3c18d23fc79acd59a
                                  • Instruction Fuzzy Hash: B3E012342114055BEB68DA2DC81D3E036D0E798316FA042799800CA691DB7AD5D7CA51

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: CriticalDeleteSection
                                  • String ID:
                                  • API String ID: 166494926-0
                                  • Opcode ID: 7bcac3c0ea3a519472b539998a5f002ef6a9cfb3e342372b578a8f479b40e683
                                  • Instruction ID: 9776357b65f308b099219f253c13073284cfa6864edcf2c5ba2ee942f8203e04
                                  • Opcode Fuzzy Hash: 7bcac3c0ea3a519472b539998a5f002ef6a9cfb3e342372b578a8f479b40e683
                                  • Instruction Fuzzy Hash: 8BF0C965E3CD0A91FB10ABAAEA977781262FF98F44F080132C90EF66568E2CE4548355
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: calloc
                                  • String ID:
                                  • API String ID: 2635317215-0
                                  • Opcode ID: 121c78d1b2291ac724d62adec3f01ff2ea2d670a96f5b98f5ad1c622ad2bd052
                                  • Instruction ID: a66c77041a84c18dd7e1995494e39e7ead7817234318315b049201956b30c5f7
                                  • Opcode Fuzzy Hash: 121c78d1b2291ac724d62adec3f01ff2ea2d670a96f5b98f5ad1c622ad2bd052
                                  • Instruction Fuzzy Hash: D3315A30618D580BF71D873C497E3F17BC1E7DA321F18916DE99ACB693DC1688878282
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: d45755ac3fc1b299357fa248614e5cf9831b05787f0c9c72564af89a9d49d463
                                  • Instruction ID: cd3b5fa64bc58aae13e93af466b72c9e5ab9750b17e12b6447646a16044c8e30
                                  • Opcode Fuzzy Hash: d45755ac3fc1b299357fa248614e5cf9831b05787f0c9c72564af89a9d49d463
                                  • Instruction Fuzzy Hash: 3631A130218A094FEB99EF29D4A5BB273E1FB58301F104169D85EC76A6DA34E981CB80
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmpi
                                  • String ID:
                                  • API String ID: 1586166983-0
                                  • Opcode ID: c6a7c236d73697e4ca57ed050e55d544e6cacc2476fd745c83e7f6659eda1179
                                  • Instruction ID: 0e843b42938c8856cda52ad80b61942837e7c04b8211a1a53852f4f343956583
                                  • Opcode Fuzzy Hash: c6a7c236d73697e4ca57ed050e55d544e6cacc2476fd745c83e7f6659eda1179
                                  • Instruction Fuzzy Hash: 0F21B630714E084FFBA5EB78EC697E67AD5EB94300F4482659007C76BAEE35D8418740
                                  APIs
                                  • HeapAlloc.KERNEL32(?,?,00000000,00007FF65325B5B1,?,?,?,00007FF65325AC99,?,?,?,?,00007FF65325A2FC), ref: 00007FF65325B9B9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: AllocHeap
                                  • String ID:
                                  • API String ID: 4292702814-0
                                  • Opcode ID: 2fa2389c0e6e9327576ae7230ec2cc57d74a542498994a459ab26bdb30104447
                                  • Instruction ID: 9a61fd5de17d0f6f7609276e05635af863fe7a9d328494d08fe50f9dfa118a75
                                  • Opcode Fuzzy Hash: 2fa2389c0e6e9327576ae7230ec2cc57d74a542498994a459ab26bdb30104447
                                  • Instruction Fuzzy Hash: 91F06D10B29E0385FE5556A69B533B942835F4AF81F0C0431C90EFE3C9EF2CE6818710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 866be03042ca6db609d6d6c9d9f612a5714b5306a720e10fa52876f15e66aca7
                                  • Instruction ID: 64284104b5c817488e90907c1a91205810c39decb9265a297c11cf1b38323083
                                  • Opcode Fuzzy Hash: 866be03042ca6db609d6d6c9d9f612a5714b5306a720e10fa52876f15e66aca7
                                  • Instruction Fuzzy Hash: 08317072618F8185EB608F64E8413ED3365FB84B44F48443ADB8EA7B98DF78C648C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 92314791a8202e474ce6d4a06551fc34d1176fb1df1a7637a0ecde0531b1dbdc
                                  • Instruction ID: 7a22d3ea3498e72ef6f079d7ef3b72307b6898b21ee2af3d9b1c900a9e4a19c7
                                  • Opcode Fuzzy Hash: 92314791a8202e474ce6d4a06551fc34d1176fb1df1a7637a0ecde0531b1dbdc
                                  • Instruction Fuzzy Hash: 6A319332628F8185DB20CF24E8412AE73A5FB85B54F580135EA8DA7B59DF3CC545CB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite$Console
                                  • String ID:
                                  • API String ID: 786612050-0
                                  • Opcode ID: db6ca6b514bfe6baef9fddffd6db4cfc884628c61a9ff2263a5caefbfa7906c6
                                  • Instruction ID: 00a1400ba73aa9a154ed989904f24fbc877f400eb4119a45d933499317272c5d
                                  • Opcode Fuzzy Hash: db6ca6b514bfe6baef9fddffd6db4cfc884628c61a9ff2263a5caefbfa7906c6
                                  • Instruction Fuzzy Hash: 78D1E222B2CE819AE710CB64D6461ED7772FF45B98F588136CE4EA7B89DE38D116C301
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InformationProcessQuery
                                  • String ID: ,$,
                                  • API String ID: 1778838933-220654547
                                  • Opcode ID: 4c387455b2af8135f36f68a1ca485273673d810924601f1bbfd7e8c304cd2754
                                  • Instruction ID: adc1b9077186616b94bf9fc39063a96888c1f77cb9c71b8ba7fb60103536c90b
                                  • Opcode Fuzzy Hash: 4c387455b2af8135f36f68a1ca485273673d810924601f1bbfd7e8c304cd2754
                                  • Instruction Fuzzy Hash: F1929430618B088FEB64EF28C8A57DA77E1FB98300F50452DD49AC7696DF35E895CB81
                                  APIs
                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF65325BD64
                                    • Part of subcall function 00007FF65325B91C: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF65325B8F9), ref: 00007FF65325B925
                                    • Part of subcall function 00007FF65325B91C: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF65325B8F9), ref: 00007FF65325B94A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                  • String ID: *?
                                  • API String ID: 4036615347-2564092906
                                  • Opcode ID: 51477899b79fb47b87869779adb4ace668866ceb80847e12acdeea9d772a1225
                                  • Instruction ID: 2d45d591d171c857792ee19d181d8de5c6fa7faff4102c69695a63768b390d43
                                  • Opcode Fuzzy Hash: 51477899b79fb47b87869779adb4ace668866ceb80847e12acdeea9d772a1225
                                  • Instruction Fuzzy Hash: F051C162B25A5585EB14CFA29A024B927A2FB49FD8B484531EE0DFBB89DE3CD1418340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: _clrfp
                                  • String ID:
                                  • API String ID: 3618594692-0
                                  • Opcode ID: 0ceb5e61b71821e81b188c088855a588cd171ed6931056397d73a61dc39e5b5f
                                  • Instruction ID: 27463a89846b9947a225c5f2377b40377630705ff329ec0f19ecfd45ca9136bc
                                  • Opcode Fuzzy Hash: 0ceb5e61b71821e81b188c088855a588cd171ed6931056397d73a61dc39e5b5f
                                  • Instruction Fuzzy Hash: 0B814B77614B888BEB14CF2AC98626C37A1F784F88F198926DB5D97B65CF39D411CB00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6836701275aafd8b1cabdcc40aa850f7b4da2566d228798606ea532f21202f1a
                                  • Instruction ID: 45d9b0616ecc893ae20b8d16f1e15b174bd441c3c45ae36cb608e73780ca4d5c
                                  • Opcode Fuzzy Hash: 6836701275aafd8b1cabdcc40aa850f7b4da2566d228798606ea532f21202f1a
                                  • Instruction Fuzzy Hash: 7F51C722B28A9144F7209BB1AA011AD7BA2AB41FD4F184134EE5CFBB9DDF3CD601C700
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1459624139.00007FF653263000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF653263000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_7ff653263000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: +Y0+
                                  • API String ID: 0-1189096879
                                  • Opcode ID: 218b495827ca7c54a9fc59e174d4ab4579c6e9ea616ffb3175963a6b010a9a00
                                  • Instruction ID: 3788f091c7b6694e8cad421b94a094097fcbc1f4bfba89376f48ae93237fdbde
                                  • Opcode Fuzzy Hash: 218b495827ca7c54a9fc59e174d4ab4579c6e9ea616ffb3175963a6b010a9a00
                                  • Instruction Fuzzy Hash: 0221782541CAC68ED7178B7085662F1BFA1EF2B72474D42EEC8C5BF4A3CE14A589CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 592b38f4438cea4cf337e753e2db7cefb672f16d4af3ebf565df486e865be0ee
                                  • Instruction ID: 76603bc4b733aded9489053e41ee8eb6321210030e03ee1a28c38b70461a60f4
                                  • Opcode Fuzzy Hash: 592b38f4438cea4cf337e753e2db7cefb672f16d4af3ebf565df486e865be0ee
                                  • Instruction Fuzzy Hash: 002201301182954AFB2DCE28C4B53F13BC1EB16784F38225DC9D7CBACBD61AA5878761
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7508843e0d615cd037e1ec8aa7846b8b8c4448116137d463d462d581942205d
                                  • Instruction ID: 8a45a52a3980911b5cb360f717eb43a67fefb6cca24dd72dae3da2747caa81c8
                                  • Opcode Fuzzy Hash: f7508843e0d615cd037e1ec8aa7846b8b8c4448116137d463d462d581942205d
                                  • Instruction Fuzzy Hash: C6124B2075892407EF1D952CDDAA3B832C2E7C6706F34523DDDC7CAACAE825A5D385C6
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBC3000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBC3000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbc3000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: abbb85bda6a6d3dd5ee5953f0580abf93674f5719b56cdfbae0f4718f3bb060b
                                  • Instruction ID: 32a44c4091090ffcb6cf0e92511f7bea4697fbdbad84ee94a5247b92ddc364c2
                                  • Opcode Fuzzy Hash: abbb85bda6a6d3dd5ee5953f0580abf93674f5719b56cdfbae0f4718f3bb060b
                                  • Instruction Fuzzy Hash: 6F6247A284E7C29FD7138B344CBA584BFB06E2320475D85DFC4C18B4E3E249A59AD767
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 797df2cedfabb869314ed1f4ac931f8eeee31d501798fc51958b84dd5215fa50
                                  • Instruction ID: a9edff38569c239547680cd4b98cac7132156d30e163517e359a0179e1e5ef7c
                                  • Opcode Fuzzy Hash: 797df2cedfabb869314ed1f4ac931f8eeee31d501798fc51958b84dd5215fa50
                                  • Instruction Fuzzy Hash: 270202B540E3C19FD3438B7498666A27FB0AF57228F1E44DBD0C0CF4A3E25A595AC762
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9261f8b8e9694e0a8479e5c14b2830bf4b544d366d584ad6239926d060a962b8
                                  • Instruction ID: 980fe433f8eb76d7935feb81cd8dbc6a291f20ea77343861bcc520dbc82773ce
                                  • Opcode Fuzzy Hash: 9261f8b8e9694e0a8479e5c14b2830bf4b544d366d584ad6239926d060a962b8
                                  • Instruction Fuzzy Hash: 03919371A6C7444BD35CCE188C861BAB3D5F7C6615F14993DF9CBC3302EA71A9078A8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 356e6471059c677381a8d4f160265ca8de49ce574f383b9f47665d3e9aff44bf
                                  • Instruction ID: f72e7b10c243f617fd9bf4b4581bcf636e84827b92a6312fecc6b958b814ba92
                                  • Opcode Fuzzy Hash: 356e6471059c677381a8d4f160265ca8de49ce574f383b9f47665d3e9aff44bf
                                  • Instruction Fuzzy Hash: 0AA18FB26687448BD35CDE1CDC826B6B3D5FB8A319F14457DE4CBC3202DA34E8478A86
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c62674bb4faf6148342de82c0aadfe89672515f6c39a02a5ebf49a255dd0d18c
                                  • Instruction ID: bcd0223f86995ea7c8ea9efa7c08d07a440c7e83bebd5bae5b28f61108a09bc8
                                  • Opcode Fuzzy Hash: c62674bb4faf6148342de82c0aadfe89672515f6c39a02a5ebf49a255dd0d18c
                                  • Instruction Fuzzy Hash: 36614A3011CE884FEB19E728C4AA7EBB7D1FB95340F54465DE0CACB6C3C92A9546C782
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa43ce0f4feb11b20e95fdff20379b252657e24bcece3fde911b7ad23ea21cec
                                  • Instruction ID: e7e467b3db4c2e040106c7a1df812751d6a63955f5cff1f15a3f9bb294d71f58
                                  • Opcode Fuzzy Hash: fa43ce0f4feb11b20e95fdff20379b252657e24bcece3fde911b7ad23ea21cec
                                  • Instruction Fuzzy Hash: 1951D2233241E05FC31DCB3D5865AAC7FE0E346745748816EEBEAD7B86CA28C525CB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 442b0520738e8f0b26db511281fac152362a0c0e853cfc2e2b038376264e2d07
                                  • Instruction ID: cd1eaad17ff46548b806e77bda3982e560b6c9821c5c5ac747b47450a3ba3b52
                                  • Opcode Fuzzy Hash: 442b0520738e8f0b26db511281fac152362a0c0e853cfc2e2b038376264e2d07
                                  • Instruction Fuzzy Hash: 1241EB30714A494FEB4DDB2C88D46947BD1EBAA350B4442A9EC85CF387C955E9C5C3D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000003.1464398093.0000019E4DBB1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019E4DBB1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_3_19e4dbb1000_LGvZDRRknR.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92ba9de3489d05dab766f769ae025e8c9fb5e1c683365a82b08a93de145879e4
                                  • Instruction ID: 668d97596fb688b458b3e77dcb2c48bd7480450eaf31062bedef48e698cf145d
                                  • Opcode Fuzzy Hash: 92ba9de3489d05dab766f769ae025e8c9fb5e1c683365a82b08a93de145879e4
                                  • Instruction Fuzzy Hash: 43418D1521DAC59EC70ACF6C4490495FFB0EBAA100B0C93DEE8D9CB747C504EA5AC7B6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 485612231-0
                                  • Opcode ID: 935d9796c0ab89579dd41d7d8fd556ea29ca1a6acacaf12adb6291f02dc1edf0
                                  • Instruction ID: 7ba9b62e001825d782e5f4e080af07865a48edb732a947ed96752f39260fffc0
                                  • Opcode Fuzzy Hash: 935d9796c0ab89579dd41d7d8fd556ea29ca1a6acacaf12adb6291f02dc1edf0
                                  • Instruction Fuzzy Hash: 7441C422724E5582EF14CF2ADA165A973A2EB48FD4B4D9032DE0DE7B68DF3CD5428300
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 47a6a44aff934139ad9a1fb715060cbbe27b3874ad12273d2e667d4a4a246391
                                  • Instruction ID: 9f82436b26ad94ff40c0db870f9a62c230ba06fa0173cb4a0ada3cbe1e7d95cb
                                  • Opcode Fuzzy Hash: 47a6a44aff934139ad9a1fb715060cbbe27b3874ad12273d2e667d4a4a246391
                                  • Instruction Fuzzy Hash: 6C41D9A36181F00AD369C739946567DBFE0E38A742B48C26AE7F6D3641DA2DC154DF20
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e1206e746778deb0b5de4a473d980ed55b3792267bf1f78954bf82af1fd3547f
                                  • Instruction ID: 65f9683c466587398bd6de6f515f9f2c4864a80a0a61c1f6a7b48b3f7791481d
                                  • Opcode Fuzzy Hash: e1206e746778deb0b5de4a473d980ed55b3792267bf1f78954bf82af1fd3547f
                                  • Instruction Fuzzy Hash: A0F068B27286569ADB988F2DA543A2977D1E7087C0F548079D59DD3F04DA7DD0508F04
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ed1fe4e2c1d85120937412dfebf78693a02543a8d43fa79386b8869577f883b1
                                  • Instruction ID: a71ee4055e153e7248c5cabfa7cb374f74e6c3f57a231a8f3762bcea854fedd8
                                  • Opcode Fuzzy Hash: ed1fe4e2c1d85120937412dfebf78693a02543a8d43fa79386b8869577f883b1
                                  • Instruction Fuzzy Hash: 3EA00223A3CD02E0E6058B40EA530712332FB50B00B484035C14EF58649F7CA588C340
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF653259452,?,?,?,00007FF65325914C,?,?,?,?,00007FF653258E75), ref: 00007FF653259225
                                  • GetLastError.KERNEL32(?,?,?,00007FF653259452,?,?,?,00007FF65325914C,?,?,?,?,00007FF653258E75), ref: 00007FF653259233
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF653259452,?,?,?,00007FF65325914C,?,?,?,?,00007FF653258E75), ref: 00007FF65325925D
                                  • FreeLibrary.KERNEL32(?,?,?,00007FF653259452,?,?,?,00007FF65325914C,?,?,?,?,00007FF653258E75), ref: 00007FF6532592A3
                                  • GetProcAddress.KERNEL32(?,?,?,00007FF653259452,?,?,?,00007FF65325914C,?,?,?,?,00007FF653258E75), ref: 00007FF6532592AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: f9fb28405466ef4016bc7bb57987e5a93f308f2527159685e7e75f0347abac11
                                  • Instruction ID: f36032eace3090aa25d0f3c9b7c8c3f012f6b23ae044bbde1f7dc37315a1524c
                                  • Opcode Fuzzy Hash: f9fb28405466ef4016bc7bb57987e5a93f308f2527159685e7e75f0347abac11
                                  • Instruction Fuzzy Hash: 3B31F221A2AE4291EE559B42AA0267533A6BF44F60F5D0531DD1DFE788EF3CE5418B40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 5d446efe2059f588e9a3296a00c0336dd5d25f3d25fac0b3af3c51d241e68a46
                                  • Instruction ID: 0f164160996b4891af1f11c949da8b2252510f2550055c9c1524a434e75873cc
                                  • Opcode Fuzzy Hash: 5d446efe2059f588e9a3296a00c0336dd5d25f3d25fac0b3af3c51d241e68a46
                                  • Instruction Fuzzy Hash: 7511B221B38E4186E7508B52E94532972A2FF89FE4F084234EA5EF7794CF7CE9058780
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 01ca4526c88355b9b1f6946c4f365fa24010f7a3ceb21ed50fe90abc5e3517f0
                                  • Instruction ID: 5668c73ad0d27f326958c78b30c33c3d10e6ecf5661b4cefc845f24e65a45b70
                                  • Opcode Fuzzy Hash: 01ca4526c88355b9b1f6946c4f365fa24010f7a3ceb21ed50fe90abc5e3517f0
                                  • Instruction Fuzzy Hash: B2F03A61A39E4281EF455BA1E99737523A2BF98F40F081035DA0FF9664DF2CD9988340
                                  APIs
                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF653260965
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,00007FF6532608E3,00000000,?,?,00007FF65325EF5F), ref: 00007FF653260A24
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,00007FF6532608E3,00000000,?,?,00007FF65325EF5F), ref: 00007FF653260AA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 2210144848-0
                                  • Opcode ID: 2be76bcc92df5ae9a3329793aca91963b5f7aff2d06561b4b645f706b756bfa7
                                  • Instruction ID: 377fa83b1e26bd37810abfebdb5252710de181025c284c2dc8e1e02f951dcd88
                                  • Opcode Fuzzy Hash: 2be76bcc92df5ae9a3329793aca91963b5f7aff2d06561b4b645f706b756bfa7
                                  • Instruction Fuzzy Hash: 0A81C322E3CE0289F7119B658A422BD67A2FF44F88F488135DA0EB7695DF3CA845D311
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: _set_statfp
                                  • String ID:
                                  • API String ID: 1156100317-0
                                  • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                  • Instruction ID: 5006eb681c1d5e6c7ed446ee17145382bca7f67e533f98b29691425f0cf6c75b
                                  • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                  • Instruction Fuzzy Hash: 8F119E26E7CF0301FB68112AE6673BD11526F94B70F1C4634EB6EB62E68E5CB8515202
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: a7ac60822bc52288c5270a9a85706b470334829171d2d6c6223cbcbffff8a2df
                                  • Instruction ID: 30f802a5d2c07739cb4cad1b84133cc3180a0f3a42ef7dbda72812cfeaa18400
                                  • Opcode Fuzzy Hash: a7ac60822bc52288c5270a9a85706b470334829171d2d6c6223cbcbffff8a2df
                                  • Instruction Fuzzy Hash: FB41C322B28E8181DB20CF25E9457A96762FB88B94F488131EE4DE7798EF3CD441CB41
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: CountCriticalInitializeSectionSpintry_get_function
                                  • String ID: InitializeCriticalSectionEx
                                  • API String ID: 539475747-3084827643
                                  • Opcode ID: dee8c7aa1d8ce8e20d5a6dfa27ce82712c084cbdc08799914ad139a6b63f43ca
                                  • Instruction ID: 5f51be4da750a092c7da3f5e12ea289d3868355fcd30f8d623b5729636a1374f
                                  • Opcode Fuzzy Hash: dee8c7aa1d8ce8e20d5a6dfa27ce82712c084cbdc08799914ad139a6b63f43ca
                                  • Instruction Fuzzy Hash: BEF0BE25B2CE9181EB249B92F2420A86262BF48FD0F4C8035EA5DBBB48CE3CD945C740
                                  APIs
                                  • try_get_function.LIBVCRUNTIME ref: 00007FF65325E619
                                  • TlsSetValue.KERNEL32(?,?,?,00007FF65325B59E,?,?,?,00007FF65325AC99,?,?,?,?,00007FF65325A2FC), ref: 00007FF65325E630
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Valuetry_get_function
                                  • String ID: FlsSetValue
                                  • API String ID: 738293619-3750699315
                                  • Opcode ID: 1443a623ed21db9c1c0bd5b21d1cc3025a8c61b90c04f35ad347f77abda517e1
                                  • Instruction ID: 981e71cb900c30172ce72ed92ee58d279c8f3a0b493f09773c8793578065365f
                                  • Opcode Fuzzy Hash: 1443a623ed21db9c1c0bd5b21d1cc3025a8c61b90c04f35ad347f77abda517e1
                                  • Instruction Fuzzy Hash: DAE03061A38E4281EB548B51E6520B92223BF48F80F4C8032DA5DBB298DE3CD945C751
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1468485954.00007FF653251000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF653250000, based on PE: true
                                  • Associated: 00000000.00000002.1468196852.00007FF653250000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468585796.00007FF653263000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468615374.00007FF653273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1468866600.00007FF6532C4000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469639738.00007FF6532CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1469760352.00007FF6532CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff653250000_LGvZDRRknR.jbxd
                                  Similarity
                                  • API ID: Heap$Alloc$Free
                                  • String ID:
                                  • API String ID: 1549400367-0
                                  • Opcode ID: ad2362557f1295e22485544cf376c64369ea1ad66f337a03f247e43dcff48300
                                  • Instruction ID: 3d5f22a6b60fdbbb0bcb5f7fe4a539d25dcf6ac442726ea71d638d1f538a5fc7
                                  • Opcode Fuzzy Hash: ad2362557f1295e22485544cf376c64369ea1ad66f337a03f247e43dcff48300
                                  • Instruction Fuzzy Hash: 2F510362B39E6252EB158B25D2527793792EB10F80F0C9435DE1EFBB89EE3DD6458300

                                  Execution Graph

                                  Execution Coverage:8.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:149
                                  Total number of Limit Nodes:2
                                  execution_graph 4183 166cd6d1005 4185 166cd6d98b0 4183->4185 4184 166cd6d98df 4185->4184 4187 166cd6d973c 4185->4187 4188 166cd6d9756 4187->4188 4189 166cd6dc440 VirtualFree 4188->4189 4194 166cd6d9858 4188->4194 4190 166cd6d97cf 4189->4190 4191 166cd6d1eb8 calloc 4190->4191 4193 166cd6d97ef 4191->4193 4192 166cd6d982f SetErrorMode 4192->4194 4193->4192 4194->4184 4035 166cd6d6024 4036 166cd6d6167 4035->4036 4037 166cd6d6046 4035->4037 4038 166cd6d6152 VirtualFree 4037->4038 4038->4036 4039 166cd6d6174 4040 166cd6d61a4 4039->4040 4049 166cd6d1eb8 4040->4049 4042 166cd6d61a9 4052 166cd6d4f54 4042->4052 4044 166cd6d6496 4045 166cd6d61d7 4045->4044 4046 166cd6d4f54 malloc 4045->4046 4048 166cd6d6213 4046->4048 4047 166cd6d648d free 4047->4044 4048->4044 4048->4047 4056 166cd6d1b7c 4049->4056 4051 166cd6d1ecb 4051->4042 4053 166cd6d4f8c 4052->4053 4055 166cd6d4fbc 4052->4055 4054 166cd6d4feb malloc 4053->4054 4053->4055 4054->4055 4055->4045 4057 166cd6d1b94 4056->4057 4058 166cd6d1b9c calloc 4057->4058 4059 166cd6d1bbe 4057->4059 4058->4059 4059->4051 4060 166cd6d8974 4062 166cd6d89ad 4060->4062 4061 166cd6d8ad4 ExitProcess 4062->4061 4066 166cd6d771c 4062->4066 4064 166cd6d89ee 4064->4061 4070 166cd6d69d8 4064->4070 4067 166cd6d7792 4066->4067 4068 166cd6d7bf8 CreateMutexExW 4067->4068 4069 166cd6d78ab 4067->4069 4068->4069 4069->4064 4099 166cd6d51bc 4070->4099 4072 166cd6d76f7 4072->4061 4073 166cd6d76ee free 4073->4072 4074 166cd6d6a4a 4074->4072 4074->4073 4105 166cd6d5fa0 4074->4105 4076 166cd6d6b01 4077 166cd6d6bbd LoadLibraryExW 4076->4077 4078 166cd6d6bdb 4077->4078 4079 166cd6d4f54 malloc 4078->4079 4081 166cd6d6c01 4079->4081 4080 166cd6d4f54 malloc 4084 166cd6d6d4c 4080->4084 4081->4080 4082 166cd6d7546 4082->4073 4083 166cd6d4f54 malloc 4087 166cd6d701b 4083->4087 4086 166cd6d4f54 malloc 4084->4086 4088 166cd6d6eb5 4084->4088 4085 166cd6d753c CloseHandle 4085->4082 4086->4088 4087->4085 4089 166cd6d710a GetTokenInformation 4087->4089 4095 166cd6d7190 4087->4095 4088->4082 4088->4083 4091 166cd6d7138 4089->4091 4090 166cd6d4f54 malloc 4097 166cd6d72d5 4090->4097 4092 166cd6d716c GetTokenInformation 4091->4092 4091->4095 4092->4095 4093 166cd6d751c 4093->4085 4094 166cd6d750c free 4094->4093 4095->4090 4096 166cd6d74f6 4096->4094 4097->4093 4097->4094 4097->4096 4098 166cd6d74af CreateTimerQueueTimer 4097->4098 4098->4096 4100 166cd6d51f7 4099->4100 4101 166cd6d52a9 malloc 4100->4101 4104 166cd6d52e6 4100->4104 4102 166cd6d52c0 4101->4102 4101->4104 4109 166cd6d50cc 4102->4109 4104->4074 4106 166cd6d5ff3 NtQueryInformationProcess 4105->4106 4108 166cd6d5fb5 4105->4108 4107 166cd6d6015 4106->4107 4107->4076 4108->4106 4108->4107 4112 166cd6d50f7 4109->4112 4110 166cd6d51af 4110->4104 4111 166cd6d51a6 free 4111->4110 4112->4110 4112->4111 4143 166cd6d8624 4144 166cd6d8663 4143->4144 4145 166cd6d771c CreateMutexExW 4144->4145 4146 166cd6d87b6 4144->4146 4147 166cd6d87b2 4145->4147 4147->4146 4148 166cd6d88ca 4147->4148 4150 166cd6d8822 4147->4150 4149 166cd6d69d8 11 API calls 4148->4149 4149->4146 4152 166cd6d8234 4150->4152 4153 166cd6d8262 4152->4153 4154 166cd6d51bc 2 API calls 4153->4154 4156 166cd6d8272 4154->4156 4155 166cd6d85f8 4155->4146 4156->4155 4157 166cd6d4f54 malloc 4156->4157 4159 166cd6d82a7 4157->4159 4159->4155 4162 166cd6d64c0 4159->4162 4160 166cd6d8338 4160->4155 4171 166cd6d9218 4160->4171 4164 166cd6d6500 4162->4164 4163 166cd6d6728 4163->4160 4164->4163 4165 166cd6d5fa0 NtQueryInformationProcess 4164->4165 4167 166cd6d6573 4165->4167 4166 166cd6d66b2 4166->4163 4168 166cd6d5fa0 NtQueryInformationProcess 4166->4168 4167->4166 4170 166cd6d65f4 4167->4170 4168->4166 4169 166cd6d5fa0 NtQueryInformationProcess 4169->4170 4170->4163 4170->4169 4172 166cd6d924e 4171->4172 4173 166cd6d4f54 malloc 4172->4173 4176 166cd6d939f 4172->4176 4174 166cd6d926d 4173->4174 4174->4176 4177 166cd6d8ae0 4174->4177 4176->4155 4179 166cd6d8b1a 4177->4179 4178 166cd6d8bea 4178->4176 4179->4178 4180 166cd6d5fa0 NtQueryInformationProcess 4179->4180 4182 166cd6d8b79 4180->4182 4181 166cd6d5fa0 NtQueryInformationProcess 4181->4182 4182->4178 4182->4181 4199 166cd6d5f54 4200 166cd6d50cc free 4199->4200 4201 166cd6d5f7b 4200->4201 4113 166cd6d4ae0 4114 166cd6d4b02 4113->4114 4115 166cd6d4b61 4113->4115 4114->4115 4116 166cd6d4b54 LoadLibraryA 4114->4116 4116->4115 4195 166cd6d1000 4196 166cd6d9878 4195->4196 4197 166cd6d98a7 4196->4197 4198 166cd6d973c 3 API calls 4196->4198 4198->4197 4121 166cd6d973c 4122 166cd6d9756 4121->4122 4128 166cd6d9858 4122->4128 4129 166cd6dc440 4122->4129 4124 166cd6d97cf 4125 166cd6d1eb8 calloc 4124->4125 4127 166cd6d97ef 4125->4127 4126 166cd6d982f SetErrorMode 4126->4128 4127->4126 4131 166cd6dc457 4129->4131 4130 166cd6dc4d0 VirtualFree 4132 166cd6dc4e6 4130->4132 4131->4130 4131->4132 4132->4124 4133 166cd6d3bc8 4134 166cd6d3bde 4133->4134 4136 166cd6d3c02 4133->4136 4135 166cd6d3bea lstrcmpiW 4134->4135 4135->4136 4137 166cd6d6758 4139 166cd6d6779 4137->4139 4138 166cd6d1eb8 calloc 4140 166cd6d67ae 4138->4140 4139->4138 4141 166cd6d6840 4139->4141 4140->4141 4142 166cd6d6810 CreateTimerQueueTimer 4140->4142 4142->4141

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 166cd6d69d8-166cd6d6a58 call 166cd6d51bc 3 166cd6d6a5e-166cd6d6aa9 call 166cd6d1f50 call 166cd6d9568 call 166cd6d1f2c 0->3 4 166cd6d76f7-166cd6d771a call 166cd6d9990 0->4 14 166cd6d6aaf-166cd6d6b78 call 166cd6d98e8 call 166cd6d98f4 call 166cd6d5fa0 call 166cd6d1f50 call 166cd6d9568 call 166cd6d1f50 call 166cd6d9568 3->14 15 166cd6d76ee-166cd6d76f1 free 3->15 31 166cd6d6b7a-166cd6d6b93 call 166cd6d1030 14->31 32 166cd6d6b99-166cd6d6b9e 14->32 15->4 31->32 34 166cd6d6ba0 32->34 35 166cd6d6ba7-166cd6d6c0c call 166cd6d1f94 LoadLibraryExW call 166cd6d1f50 call 166cd6d4f54 call 166cd6d1f2c 32->35 34->35 46 166cd6d6cb3-166cd6d6cb6 35->46 47 166cd6d6c12-166cd6d6c17 35->47 48 166cd6d6d22 46->48 49 166cd6d6cb8-166cd6d6cf0 call 166cd6d98f4 46->49 50 166cd6d6caa-166cd6d6cab 47->50 51 166cd6d6c1d-166cd6d6c22 47->51 52 166cd6d6d26-166cd6d6d57 call 166cd6d1f50 call 166cd6d4f54 call 166cd6d1f2c 48->52 64 166cd6d6cf2-166cd6d6d01 call 166cd6d8ecc 49->64 65 166cd6d6d06-166cd6d6d20 call 166cd6d5b00 49->65 50->46 51->50 54 166cd6d6c28-166cd6d6c75 call 166cd6d5b00 call 166cd6d1030 51->54 75 166cd6d6f1f-166cd6d6f50 call 166cd6d1f50 call 166cd6d9568 call 166cd6d1f2c 52->75 76 166cd6d6d5d-166cd6d6d62 52->76 73 166cd6d6c9c-166cd6d6ca8 54->73 74 166cd6d6c77-166cd6d6c9a call 166cd6d1030 54->74 64->65 65->52 73->50 74->73 95 166cd6d6f52-166cd6d6fa6 call 166cd6d1030 75->95 96 166cd6d6fae-166cd6d6fdf call 166cd6dc374 75->96 78 166cd6d6f0b-166cd6d6f19 76->78 79 166cd6d6d68-166cd6d6d6d 76->79 78->75 89 166cd6d76dd-166cd6d76e7 78->89 79->78 82 166cd6d6d73-166cd6d6dcb call 166cd6d5b00 call 166cd6d1030 79->82 100 166cd6d6df2-166cd6d6e0b call 166cd6dc0e4 82->100 101 166cd6d6dcd-166cd6d6df0 call 166cd6d1030 82->101 89->15 95->96 121 166cd6d6fe5-166cd6d7026 call 166cd6d1f50 call 166cd6d4f54 call 166cd6d1f2c 96->121 122 166cd6d7546-166cd6d754d 96->122 110 166cd6d6e11-166cd6d6e2c call 166cd6dc1a4 100->110 111 166cd6d6eed-166cd6d6f04 call 166cd6d5b00 100->111 101->100 110->111 120 166cd6d6e32-166cd6d6e41 110->120 111->78 123 166cd6d6e43-166cd6d6e46 120->123 124 166cd6d6e57-166cd6d6ebb call 166cd6d5b00 * 4 call 166cd6d1f50 call 166cd6d4f54 120->124 147 166cd6d709c-166cd6d70a1 121->147 148 166cd6d7028-166cd6d7036 121->148 128 166cd6d7554-166cd6d755c 122->128 129 166cd6d754f-166cd6d7550 122->129 123->124 125 166cd6d6e48-166cd6d6e4f 123->125 178 166cd6d6eda-166cd6d6edd 124->178 179 166cd6d6ebd-166cd6d6ed0 124->179 125->124 130 166cd6d756f-166cd6d757a 128->130 131 166cd6d755e-166cd6d7566 128->131 129->128 130->89 134 166cd6d7580-166cd6d7599 call 166cd6d4de8 130->134 131->130 134->89 143 166cd6d759f-166cd6d75b5 134->143 143->89 157 166cd6d75bb-166cd6d7692 call 166cd6d1030 * 4 143->157 149 166cd6d70a3-166cd6d70c6 call 166cd6d1f50 call 166cd6d1f2c 147->149 150 166cd6d70cb-166cd6d70e3 147->150 153 166cd6d7093-166cd6d7094 148->153 154 166cd6d7038 148->154 149->150 168 166cd6d753c-166cd6d7540 CloseHandle 150->168 169 166cd6d70e9-166cd6d7104 150->169 153->147 155 166cd6d703a-166cd6d703e 154->155 159 166cd6d7040-166cd6d7045 155->159 160 166cd6d704a-166cd6d7052 155->160 198 166cd6d7694 157->198 199 166cd6d7698-166cd6d76d5 call 166cd6d99b6 157->199 159->160 165 166cd6d7047 159->165 160->155 166 166cd6d7054-166cd6d7056 160->166 165->160 166->153 171 166cd6d7058-166cd6d7067 166->171 168->122 189 166cd6d7284-166cd6d7287 169->189 190 166cd6d710a-166cd6d7136 GetTokenInformation 169->190 187 166cd6d7072-166cd6d7082 171->187 178->111 180 166cd6d6edf-166cd6d6ee2 178->180 179->178 180->111 186 166cd6d6ee4-166cd6d6ee5 180->186 186->111 201 166cd6d7084 187->201 202 166cd6d7069-166cd6d706b 187->202 195 166cd6d72ab-166cd6d72e0 call 166cd6d1f50 call 166cd6d4f54 call 166cd6d1f2c 189->195 196 166cd6d7289-166cd6d72a7 call 166cd6d6858 189->196 192 166cd6d7147-166cd6d7157 190->192 193 166cd6d7138-166cd6d7141 190->193 211 166cd6d7274-166cd6d7282 192->211 213 166cd6d715d-166cd6d718e call 166cd6d98f4 GetTokenInformation 192->213 193->192 193->211 226 166cd6d752b-166cd6d7530 195->226 227 166cd6d72e6-166cd6d72eb 195->227 196->195 198->199 199->89 201->153 208 166cd6d706d-166cd6d7070 202->208 209 166cd6d7086-166cd6d7090 202->209 208->187 209->153 211->189 211->195 223 166cd6d7190-166cd6d7199 213->223 224 166cd6d719b-166cd6d719e 213->224 223->224 224->211 225 166cd6d71a4-166cd6d722f 224->225 234 166cd6d7231-166cd6d725e 225->234 235 166cd6d726b-166cd6d726c 225->235 226->168 228 166cd6d72f1-166cd6d72f6 227->228 229 166cd6d750c-166cd6d751a free 227->229 228->229 233 166cd6d72fc-166cd6d7335 call 166cd6d5b00 228->233 229->226 232 166cd6d751c-166cd6d7520 229->232 232->226 233->229 240 166cd6d733b-166cd6d7369 call 166cd6d98f4 call 166cd6d1030 233->240 234->235 235->211 246 166cd6d736b-166cd6d736c 240->246 247 166cd6d7399-166cd6d73b5 call 166cd6dc0e4 240->247 248 166cd6d7371-166cd6d7393 call 166cd6d1030 246->248 253 166cd6d73bb-166cd6d73d7 call 166cd6dc1a4 247->253 254 166cd6d74f6-166cd6d7502 call 166cd6d5b00 247->254 257 166cd6d7395-166cd6d7396 248->257 253->254 260 166cd6d73dd-166cd6d741c 253->260 259 166cd6d7507-166cd6d7508 254->259 257->247 259->229 261 166cd6d7455-166cd6d7497 call 166cd6d5b00 * 3 260->261 262 166cd6d741e-166cd6d741f 260->262 276 166cd6d74af-166cd6d74f4 CreateTimerQueueTimer 261->276 277 166cd6d7499-166cd6d74aa call 166cd6d1030 261->277 263 166cd6d7422-166cd6d7428 262->263 265 166cd6d7442-166cd6d744f 263->265 266 166cd6d742a-166cd6d742d 263->266 265->263 269 166cd6d7451-166cd6d7452 265->269 266->265 268 166cd6d742f-166cd6d7432 266->268 268->265 271 166cd6d7434-166cd6d743d call 166cd6d5b00 268->271 269->261 271->265 276->259 277->276
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Information$TimerTokenfree$CloseCreateHandleLibraryLoadProcessQueryQueue
                                  • String ID: ,$,
                                  • API String ID: 1885258845-220654547
                                  • Opcode ID: 4c387455b2af8135f36f68a1ca485273673d810924601f1bbfd7e8c304cd2754
                                  • Instruction ID: 32b5c778ea3ce7db9fa77a90e82b8386c259cb012fb78accd01e831370ca21ec
                                  • Opcode Fuzzy Hash: 4c387455b2af8135f36f68a1ca485273673d810924601f1bbfd7e8c304cd2754
                                  • Instruction Fuzzy Hash: 88926F31618F488FE764EF6AD8957EAB3D1FBA8300F104529D48AC3292DF75D855CB82

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 494 166cd6d51bc-166cd6d51f5 495 166cd6d5201-166cd6d520a 494->495 496 166cd6d51f7-166cd6d51ff 494->496 497 166cd6d520c-166cd6d5214 495->497 498 166cd6d5216-166cd6d521a 495->498 496->495 497->498 499 166cd6d521c-166cd6d5224 498->499 500 166cd6d5226-166cd6d523e 498->500 499->500 501 166cd6d5240-166cd6d5248 500->501 502 166cd6d524a-166cd6d524d 500->502 501->502 503 166cd6d524f-166cd6d5257 502->503 504 166cd6d5259-166cd6d525c 502->504 503->504 505 166cd6d525e-166cd6d5266 504->505 506 166cd6d5268-166cd6d5276 504->506 505->506 507 166cd6d5475 506->507 508 166cd6d527c-166cd6d5296 call 166cd6d1030 506->508 510 166cd6d5477-166cd6d5487 507->510 508->507 512 166cd6d529c-166cd6d52a3 508->512 512->507 513 166cd6d52a9-166cd6d52ba malloc 512->513 513->507 514 166cd6d52c0-166cd6d52e1 call 166cd6d50cc 513->514 516 166cd6d52e6-166cd6d52f8 514->516 518 166cd6d52fe-166cd6d532a call 166cd6d98f4 516->518 519 166cd6d546c-166cd6d546d 516->519 522 166cd6d532c-166cd6d5334 518->522 519->507 523 166cd6d533f-166cd6d5345 522->523 524 166cd6d5336-166cd6d533d 522->524 525 166cd6d5347-166cd6d5355 523->525 524->525 525->522 526 166cd6d5357-166cd6d53c6 call 166cd6d38c0 525->526 529 166cd6d5463-166cd6d5464 526->529 530 166cd6d53cc-166cd6d53d7 526->530 529->519 531 166cd6d53d9-166cd6d5409 530->531 533 166cd6d540b-166cd6d5417 531->533 533->531 534 166cd6d5419-166cd6d5420 533->534 535 166cd6d5422-166cd6d5423 534->535 536 166cd6d545c-166cd6d5461 534->536 537 166cd6d5425-166cd6d542c 535->537 536->510 538 166cd6d544f-166cd6d545a 537->538 539 166cd6d542e-166cd6d5432 537->539 538->536 538->537 540 166cd6d5434-166cd6d543e 539->540 541 166cd6d5445-166cd6d544d 540->541 542 166cd6d5440 540->542 541->538 541->540 542->541
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: malloc
                                  • String ID:
                                  • API String ID: 2803490479-0
                                  • Opcode ID: b6ed53fab85cf22cf76427c2e966a0a197060846b061c1a52c71d60efdb2ca86
                                  • Instruction ID: 957e4aa9b99b8ba2d4be0f6ce039797e7d96012bfe87db7d64a34720bc943e50
                                  • Opcode Fuzzy Hash: b6ed53fab85cf22cf76427c2e966a0a197060846b061c1a52c71d60efdb2ca86
                                  • Instruction Fuzzy Hash: 15915832608D484BE76CDB2A9C853F977D1F796305F24822ED4CBC6682EA7AD507C781

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InformationProcessQuery
                                  • String ID:
                                  • API String ID: 1778838933-0
                                  • Opcode ID: aedaa32b066cd7baad790dc79b89f0f0aa25ff69fa0ea66035def9c6c87aec9e
                                  • Instruction ID: 8aaf511abd44e63a6d80a28a35ef7c961259fb304502482fae9d39680af46a5e
                                  • Opcode Fuzzy Hash: aedaa32b066cd7baad790dc79b89f0f0aa25ff69fa0ea66035def9c6c87aec9e
                                  • Instruction Fuzzy Hash: 5A018F31228E094FEB49EB7AAC90BA673E4F765304F204929D49AC35A1EF7AC505CB41

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: freemalloc
                                  • String ID: CeP$,$,
                                  • API String ID: 3061335427-2996039724
                                  • Opcode ID: e353c29c0b88583718f6329c71bf4d43162d928d93945ef273b572fc5238f9b0
                                  • Instruction ID: ac52f4e5d506c8081b41b8a0c2878a6300bbe14026837b7fc54a5e13e904831e
                                  • Opcode Fuzzy Hash: e353c29c0b88583718f6329c71bf4d43162d928d93945ef273b572fc5238f9b0
                                  • Instruction Fuzzy Hash: A0A17931618E088BDB58EF6AE8957E973D1FB98310F20851DE4CAC3296DE35D846C781
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000003.1464529656.00000166CD370000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000166CD370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_3_166cd370000_svchost.jbxd
                                  Similarity
                                  • API ID: FreeVirtual$CloseFileHandleView
                                  • String ID:
                                  • API String ID: 867161474-0
                                  • Opcode ID: 891408fe0d1448a39d4c9211b5b17748033e0253f96817e96866cc630ca6b417
                                  • Instruction ID: 1aa28bf52addce392effc3f1bbf440451a498781f41fa4c81590a8c43acbe4de
                                  • Opcode Fuzzy Hash: 891408fe0d1448a39d4c9211b5b17748033e0253f96817e96866cc630ca6b417
                                  • Instruction Fuzzy Hash: 41716331608F099FD758AB28D9957AAB3E1FB95310F51462EE48EC3281DB75EC42C7C2

                                  Control-flow Graph

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: NJI@
                                  • API String ID: 0-1894075864
                                  • Opcode ID: d45665fd503c042bbd1cddf3e76509b083df421fb529cf4e6337dc35805fb2d8
                                  • Instruction ID: 6862643f3849acd7f1b58efc354166136803a32b9aa12f85142cca4c26653310
                                  • Opcode Fuzzy Hash: d45665fd503c042bbd1cddf3e76509b083df421fb529cf4e6337dc35805fb2d8
                                  • Instruction Fuzzy Hash: 1AE16C7151CBD48BD3759F2A98913EBBBE1FB99302F10492EE4CAC2281DB749501CB83

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcess
                                  • String ID: !RHY
                                  • API String ID: 621844428-2095432132
                                  • Opcode ID: 2866ae3145b7b2e8b7e50758e3c18dccd0790ead28cb59ab9252b37ae8079d46
                                  • Instruction ID: 0c8cb59c360accf2510e8a8efad59f513a7e877549a74c985f1e6afdafa22472
                                  • Opcode Fuzzy Hash: 2866ae3145b7b2e8b7e50758e3c18dccd0790ead28cb59ab9252b37ae8079d46
                                  • Instruction Fuzzy Hash: FB41A331208F484FEB54EF69D889BDAB7E0EBA4300F144569EC8AC7242DF75D805CB92

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00000166CD6DC440: VirtualFree.KERNELBASE(?,?,?,?,?,?,?,00000166CD6D97CF), ref: 00000166CD6DC4D8
                                  • SetErrorMode.KERNELBASE ref: 00000166CD6D9834
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFreeModeVirtual
                                  • String ID:
                                  • API String ID: 3123725612-0
                                  • Opcode ID: c558a3bee63eb8d82cfee7bb6036631f102c00f5edc4b5b2d839b26d2bc08f01
                                  • Instruction ID: 3052c6c4fb9a9bf01af82893c8d25f9196ac6b1cf7acb0b85d46e92023200910
                                  • Opcode Fuzzy Hash: c558a3bee63eb8d82cfee7bb6036631f102c00f5edc4b5b2d839b26d2bc08f01
                                  • Instruction Fuzzy Hash: B8317432218E484BEB54FB6BEC85BE973D5FBA8304F600519F48AC7192DE29D941C781

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Timer$CreateQueue
                                  • String ID:
                                  • API String ID: 3971536239-0
                                  • Opcode ID: be435db6b7ad7525147855a81f15317f39cb1624dd000f31126bb55325e5aa6a
                                  • Instruction ID: e1448120521b79ee009ea212f1e2be8796ff970f5ea846443475362de449bb3e
                                  • Opcode Fuzzy Hash: be435db6b7ad7525147855a81f15317f39cb1624dd000f31126bb55325e5aa6a
                                  • Instruction Fuzzy Hash: 8A31C431314E0D5FEB48EBABD895BE2B3E5FB68310F204518D489C3641CB72E850C781

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 543 166cd6d4ae0-166cd6d4b00 544 166cd6d4b02-166cd6d4b0c 543->544 545 166cd6d4b61 543->545 547 166cd6d4b0e-166cd6d4b1c 544->547 548 166cd6d4b40-166cd6d4b52 call 166cd6d9460 544->548 546 166cd6d4b63-166cd6d4b7a call 166cd6d9990 545->546 551 166cd6d4b1e-166cd6d4b2f 547->551 548->546 556 166cd6d4b54-166cd6d4b5f LoadLibraryA 548->556 554 166cd6d4b31 551->554 555 166cd6d4b36-166cd6d4b3e 551->555 554->555 555->548 555->551 556->546
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 2720f2c82129b4cf1e9cdd73d7b21f18690d3eabbfb2c3e4d773bbe3f80b722c
                                  • Instruction ID: 5db84a6d9de98112c59e3a8e9b821fc9fe00fc9f78e7f9b70ebd96f07e5b6a5c
                                  • Opcode Fuzzy Hash: 2720f2c82129b4cf1e9cdd73d7b21f18690d3eabbfb2c3e4d773bbe3f80b722c
                                  • Instruction Fuzzy Hash: A211C032128E484BE769AB3BAC153E672D0F7B5308F60416DD0CAC21D2EA29D906C752

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 0ef85e6c49b167f6fa9e03bb0202aec9cadee554545795ea33251ab7e92968d2
                                  • Instruction ID: f4b1028c85b12096d5e54763a9eeec2749755ee8672ff95ab838ef1bfa62e115
                                  • Opcode Fuzzy Hash: 0ef85e6c49b167f6fa9e03bb0202aec9cadee554545795ea33251ab7e92968d2
                                  • Instruction Fuzzy Hash: F6016832224E0C4FE754EB2BD8457FA72D5F7A8305F60456AA4CBC2191EB35D944C752
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000003.1464529656.00000166CD370000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000166CD370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_3_166cd370000_svchost.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                                  • Instruction ID: 48a2fddda10e46656035d476ccc9c0da6c38c4f862434033783d382e17061ead
                                  • Opcode Fuzzy Hash: abb3666d5f0e7e3691c5e241d5b349d303e7c196ced747a2022f8ae30c0d6593
                                  • Instruction Fuzzy Hash: 62919E71218B809FE3A0CB18C581B6ABBF0FB9A348F54096DF5C9D7291D73AD841DB06

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 580 166cd6d4f54-166cd6d4f86 581 166cd6d4f8c-166cd6d4fa6 call 166cd6d940c 580->581 582 166cd6d50b6-166cd6d50c9 580->582 581->582 585 166cd6d4fac-166cd6d4faf 581->585 586 166cd6d4fc1-166cd6d4fe6 585->586 587 166cd6d4fb1-166cd6d4fba 585->587 589 166cd6d4feb-166cd6d4ffb malloc 586->589 590 166cd6d4fe8 586->590 587->585 588 166cd6d4fbc 587->588 588->582 589->582 591 166cd6d5001-166cd6d5005 589->591 590->589 592 166cd6d500b-166cd6d5014 591->592 593 166cd6d5099-166cd6d50a0 591->593 594 166cd6d5018-166cd6d5036 592->594 595 166cd6d50a2-166cd6d50ab 593->595 596 166cd6d50ad-166cd6d50b0 593->596 598 166cd6d5091-166cd6d5092 594->598 599 166cd6d5038-166cd6d5048 594->599 595->582 596->582 597 166cd6d50b2-166cd6d50b3 596->597 597->582 598->593 600 166cd6d5080-166cd6d508f 599->600 601 166cd6d504a-166cd6d5051 599->601 600->594 600->598 603 166cd6d5053-166cd6d5065 601->603 604 166cd6d506d-166cd6d5079 603->604 605 166cd6d5067-166cd6d5069 603->605 604->603 606 166cd6d507b-166cd6d507c 604->606 605->604 606->600
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: malloc
                                  • String ID:
                                  • API String ID: 2803490479-0
                                  • Opcode ID: 90cd778a792e42c64db594db91f27ad2126318ab58eecec55435c6b2a2086037
                                  • Instruction ID: 5a47a3a94f7e6e962a1008e3c8fa53819c2a7f6d5d0e936fff337724179d708b
                                  • Opcode Fuzzy Hash: 90cd778a792e42c64db594db91f27ad2126318ab58eecec55435c6b2a2086037
                                  • Instruction Fuzzy Hash: 0C413E32118E194BD71C9B1FEC866F577D1FB92711F28812ED8D7C3556E921A803C6D2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 607 166cd6d50cc-166cd6d50fd 609 166cd6d5103-166cd6d5108 607->609 610 166cd6d51af-166cd6d51b9 607->610 611 166cd6d5123-166cd6d5124 609->611 612 166cd6d510a-166cd6d5121 609->612 613 166cd6d5129-166cd6d512f 611->613 612->611 612->612 614 166cd6d5131-166cd6d5132 613->614 615 166cd6d517b-166cd6d517f 613->615 616 166cd6d5134-166cd6d5179 614->616 615->613 617 166cd6d5181-166cd6d5184 615->617 616->615 616->616 618 166cd6d51a6-166cd6d51a9 free 617->618 619 166cd6d5186-166cd6d5192 617->619 618->610 620 166cd6d5194-166cd6d51a4 619->620 620->618 620->620
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 121c78d1b2291ac724d62adec3f01ff2ea2d670a96f5b98f5ad1c622ad2bd052
                                  • Instruction ID: ceb7e8fb658c9a14726510409e09c159d3075d70bc39973c96fc60c32fd929d2
                                  • Opcode Fuzzy Hash: 121c78d1b2291ac724d62adec3f01ff2ea2d670a96f5b98f5ad1c622ad2bd052
                                  • Instruction Fuzzy Hash: 6F312531618D580BF72D462E5D6A3B17BC1E7EB321F28416EE8DAC6692DC168857C281

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: d45755ac3fc1b299357fa248614e5cf9831b05787f0c9c72564af89a9d49d463
                                  • Instruction ID: 677da1ef4b8784c832f21b1dda23f0088f8ea4b07a3880f0c90c40849826ef2d
                                  • Opcode Fuzzy Hash: d45755ac3fc1b299357fa248614e5cf9831b05787f0c9c72564af89a9d49d463
                                  • Instruction Fuzzy Hash: BA31B431218E094FEB58EF5AD894BB273D1FB6C305F11416AD84EC32A6DE34D841CB80

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: 24982d73c66e1a4d078db24c6322379e549b9d86f2eea88fe5e7b398dafb8cc5
                                  • Instruction ID: 20126067ec8f23d6d10d1559e08d6bffc9ccf78c62a6bcaed53cd1d90050a0ed
                                  • Opcode Fuzzy Hash: 24982d73c66e1a4d078db24c6322379e549b9d86f2eea88fe5e7b398dafb8cc5
                                  • Instruction Fuzzy Hash: 8541AF31508A488FDB45EF29D880BE5B7E1FBA8300F144679E8CACB246CB359541CB52

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: lstrcmpi
                                  • String ID:
                                  • API String ID: 1586166983-0
                                  • Opcode ID: c6a7c236d73697e4ca57ed050e55d544e6cacc2476fd745c83e7f6659eda1179
                                  • Instruction ID: 00bb524ba526294ff6d3bd0482806ce4b9c5be56942ec75c78b76a8ffd4996b2
                                  • Opcode Fuzzy Hash: c6a7c236d73697e4ca57ed050e55d544e6cacc2476fd745c83e7f6659eda1179
                                  • Instruction Fuzzy Hash: D021B632710D084FFBA4EB3BBC457EA36D6EBA5301F5442659047C35BAEE358801CB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6D1000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6d1000_svchost.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: calloc
                                  • String ID:
                                  • API String ID: 2635317215-0
                                  • Opcode ID: 418f43b1e00efb7115a884b72c32553d8d6b497a6a4eddd5ee5fb9b938cd136f
                                  • Instruction ID: 193c65bbe96de1d669949d0a92818df1f8621e4c9d9d4dc11169b11221af55ed
                                  • Opcode Fuzzy Hash: 418f43b1e00efb7115a884b72c32553d8d6b497a6a4eddd5ee5fb9b938cd136f
                                  • Instruction Fuzzy Hash: 63F05E31214D094FF795AB3AAC9876536D5EBA8301F6400769809C62A0EF79CC85C710
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1504542898.00000166CD6E3000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000166CD6E3000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_166cd6e3000_svchost.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 65e2935da237788fdda34a38a73a3239899df38739b7cce9c324f361412e95d3
                                  • Instruction ID: 73dd2af59e96965b237b2c413222c7ab2db1d96429eba91700558766ae972c43
                                  • Opcode Fuzzy Hash: 65e2935da237788fdda34a38a73a3239899df38739b7cce9c324f361412e95d3
                                  • Instruction Fuzzy Hash: C431AA8284EBD25FC72397751C7A49AFF706D2324075D89CFC4C28A8E3E2486199C7A7