Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Installer.msi

Overview

General Information

Sample name:Installer.msi
Analysis ID:1362406
MD5:1e3ff8672dd9df37ac5696222fd0bec7
SHA1:5437218f7389925a7ea5bc780d1351d6ce3ea067
SHA256:0e81a36141d196401c46f6ce293a370e8f21c5e074db5442ff2ba6f223c435f5
Tags:msipikabot
Infos:

Detection

PikaBot
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected PikaBot
Contains functionality to check for running processes (XOR)
Sample uses process hollowing technique
Writes to foreign memory regions
Adds / modifies Windows certificates
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain checking for process token information
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 6832 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Installer.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 6948 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7100 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding FB72CBA66D1B5B7C2EC1EC7FC50D4B55 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • SearchProtocolHost.exe (PID: 4488 cmdline: C:\Windows\System32\SearchProtocolHost.exe MD5: 727FE964E574EEAF8917308FFF0880DE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
PikabotIntroducing Pikabot, an emerging malware family that comprises a downloader/installer, a loader, and a core backdoor component. Despite being in the early stages of development, it already demonstrates advanced techniques in evasion, injection, and anti-analysis. Notably, the loader component incorporates an array of sophisticated anti-debugging and anti-VM measures inspired by the open-source Al-Khaser project, while leveraging steganography to conceal its payload. Additionally, Pikabot utilizes a proprietary C2 framework and supports a diverse range of commands, encompassing host enumeration and advanced secondary payload injection options.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.pikabot
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PikaBotYara detected PikaBotJoe Security
    SourceRuleDescriptionAuthorStrings
    3.2.SearchProtocolHost.exe.b10000.0.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
      3.2.SearchProtocolHost.exe.b10000.0.raw.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results
        Source: Binary string: NtPrint.pdbGCTL source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.dr
        Source: Binary string: NtPrint.pdb source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.dr
        Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
        Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: unknownTCP traffic detected without corresponding DNS query: 172.232.186.251
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CF8000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.3.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: SearchProtocolHost.exe, 00000003.00000003.1831622723.000000000583A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?16b8e16730ac9
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://ocsps.ssl.com0
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://ocsps.ssl.com0?
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.232.186.251/
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.232.186.251/9
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmp, SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002C86000.00000004.00000020.00020000.00000000.sdmp, SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlike
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlikeI
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlikeT
        Source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drString found in binary or memory: https://www.ssl.com/repository0
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B59710 NtPssCaptureVaSpaceBulk,3_2_00B59710
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\44d546.msiJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSID6AF.tmpJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B222B33_2_00B222B3
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1E6B93_2_00B1E6B9
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B48E943_2_00B48E94
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B3C2E03_2_00B3C2E0
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B2D2D43_2_00B2D2D4
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B252D53_2_00B252D5
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B40A2D3_2_00B40A2D
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1E2053_2_00B1E205
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B420003_2_00B42000
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1D1FF3_2_00B1D1FF
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B335EB3_2_00B335EB
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B437393_2_00B43739
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B201573_2_00B20157
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1DD593_2_00B1DD59
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1D95C3_2_00B1D95C
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B542B03_2_00B542B0
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B184A83_2_00B184A8
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B3B6A83_2_00B3B6A8
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B562973_2_00B56297
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B3AAFC3_2_00B3AAFC
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1B2ED3_2_00B1B2ED
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B564DC3_2_00B564DC
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B5682C3_2_00B5682C
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B4982E3_2_00B4982E
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B3F8063_2_00B3F806
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B4AE0C3_2_00B4AE0C
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B2AE0C3_2_00B2AE0C
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B55A673_2_00B55A67
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B3E4413_2_00B3E441
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1EDBD3_2_00B1EDBD
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B233BC3_2_00B233BC
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1F5BE3_2_00B1F5BE
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B4FDA03_2_00B4FDA0
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B583AD3_2_00B583AD
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B5339E3_2_00B5339E
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B277ED3_2_00B277ED
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B4F5D43_2_00B4F5D4
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1C1D63_2_00B1C1D6
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B43BC53_2_00B43BC5
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B20FCC3_2_00B20FCC
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B51B263_2_00B51B26
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B3D9293_2_00B3D929
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B4A52E3_2_00B4A52E
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B2EF163_2_00B2EF16
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B311023_2_00B31102
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B427023_2_00B42702
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B31B093_2_00B31B09
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B355733_2_00B35573
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B4877B3_2_00B4877B
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B163603_2_00B16360
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B4556C3_2_00B4556C
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B437503_2_00B43750
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1FF5D3_2_00B1FF5D
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B147483_2_00B14748
        Source: Installer.msiBinary or memory string: OriginalFilenamentprint.exej% vs Installer.msi
        Source: Installer.msiBinary or memory string: OriginalFilenameRTLCPAPI.DLL vs Installer.msi
        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netprojw.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ghofr.dllJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fg122.dllJump to behavior
        Source: classification engineClassification label: mal60.troj.evad.winMSI@6/23@0/1
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B252D5 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,3_2_00B252D5
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CMLFFF0.tmpJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeMutant created: \Sessions\1\BaseNamedObjects\{5A23F24B-9AA8-4106-A0EA-719B96FE488B}
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF71AAADE0E9A6F831.TMPJump to behavior
        Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: Installer.msiStatic file information: TRID: Microsoft Windows Installer (60509/1) 88.31%
        Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Installer.msi"
        Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FB72CBA66D1B5B7C2EC1EC7FC50D4B55
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\SearchProtocolHost.exe C:\Windows\System32\SearchProtocolHost.exe
        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FB72CBA66D1B5B7C2EC1EC7FC50D4B55Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\SearchProtocolHost.exe C:\Windows\System32\SearchProtocolHost.exeJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: Binary string: NtPrint.pdbGCTL source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.dr
        Source: Binary string: NtPrint.pdb source: Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.dr

        Data Obfuscation

        barindex
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,3_2_00B252D5
        Source: MSID6AF.tmp.1.drStatic PE information: real checksum: 0x22896 should be: 0xabfee
        Source: MSID6AF.tmp.1.drStatic PE information: section name: .TEaOloc
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B59710 push dword ptr [00B5A004h]; ret 3_2_00B59774
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B5A054 push edx; retf 006Fh3_2_00B5A06A
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID6AF.tmpJump to dropped file
        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID6AF.tmpJump to dropped file
        Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\743AF0529BD032A0F44A83CDD4BAA97B7C2EC49A BlobJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_3-15095
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002C86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpm
        Source: SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugFlagsJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B2D115 mov eax, dword ptr fs:[00000030h]3_2_00B2D115
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B2D101 mov eax, dword ptr fs:[00000030h]3_2_00B2D101

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\SysWOW64\msiexec.exeSection unmapped: C:\Windows\SysWOW64\SearchProtocolHost.exe base address: B10000Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B1632AJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B16340Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B16352Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B16359Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B16391Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B163CBJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B16854Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B1685CJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B16B7EJump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeMemory written: C:\Windows\SysWOW64\SearchProtocolHost.exe base: B16CB0Jump to behavior
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\SearchProtocolHost.exe C:\Windows\System32\SearchProtocolHost.exeJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1EC0E cpuid 3_2_00B1EC0E
        Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\SearchProtocolHost.exeCode function: 3_2_00B1D95C GetUserNameW,3_2_00B1D95C
        Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\743AF0529BD032A0F44A83CDD4BAA97B7C2EC49A BlobJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 3.2.SearchProtocolHost.exe.b10000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.SearchProtocolHost.exe.b10000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 3.2.SearchProtocolHost.exe.b10000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.SearchProtocolHost.exe.b10000.0.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
        1
        Replication Through Removable Media
        1
        Native API
        1
        DLL Side-Loading
        211
        Process Injection
        21
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        1
        Replication Through Removable Media
        1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
        Default Accounts1
        Shared Modules
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Modify Registry
        LSASS Memory1
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataSIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
        Domain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Virtualization/Sandbox Evasion
        Security Account Manager12
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
        Local AccountsCronLogin HookLogin Hook1
        Disable or Modify Tools
        NTDS11
        Peripheral Device Discovery
        Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
        Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script211
        Process Injection
        LSA Secrets1
        Account Discovery
        SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
        Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Obfuscated Files or Information
        Cached Domain Credentials1
        System Owner/User Discovery
        VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
        External Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSync22
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
        Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        File Deletion
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1362406 Sample: Installer.msi Startdate: 14/12/2023 Architecture: WINDOWS Score: 60 25 Yara detected PikaBot 2->25 7 msiexec.exe 81 36 2->7         started        10 msiexec.exe 3 2->10         started        process3 file4 19 C:\Windows\Installer\MSID6AF.tmp, PE32 7->19 dropped 12 msiexec.exe 7->12         started        process5 signatures6 27 Writes to foreign memory regions 12->27 29 Sample uses process hollowing technique 12->29 15 SearchProtocolHost.exe 2 12 12->15         started        process7 dnsIp8 21 172.232.186.251, 49731, 5632 AKAMAI-ASN1EU United States 15->21 23 Contains functionality to check for running processes (XOR) 15->23 signatures9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        SourceDetectionScannerLabelLink
        C:\Windows\Installer\MSID6AF.tmp100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://ocsps.ssl.com0?0%URL Reputationsafe
        http://ocsps.ssl.com00%URL Reputationsafe
        https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlikeT0%Avira URL Cloudsafe
        https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlikeI0%Avira URL Cloudsafe
        https://172.232.186.251/90%Avira URL Cloudsafe
        https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlike0%Avira URL Cloudsafe
        https://172.232.186.251/0%Avira URL Cloudsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
          high
          https://172.232.186.251/9SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crls.ssl.com/ssl.com-rsa-RootCA.crl0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
            high
            http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
              high
              https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlikeTSearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlikeSearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmp, SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002C86000.00000004.00000020.00020000.00000000.sdmp, SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002C50000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.ssl.com/repository0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                high
                http://ocsps.ssl.com0?Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                • URL Reputation: safe
                unknown
                http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                  high
                  http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0QInstaller.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                    high
                    http://ocsps.ssl.com0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                    • URL Reputation: safe
                    unknown
                    http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                      high
                      http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                        high
                        http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0Installer.msi, 44d548.msi.1.dr, 44d546.msi.1.drfalse
                          high
                          https://172.232.186.251:5632/Unsqueamishness/P1WaaAvbipOgTBhh7?Regild=ArbutaseCasketlikeISearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://172.232.186.251/SearchProtocolHost.exe, 00000003.00000002.2893855055.0000000002CB1000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          172.232.186.251
                          unknownUnited States
                          20940AKAMAI-ASN1EUfalse
                          Joe Sandbox version:38.0.0 Ammolite
                          Analysis ID:1362406
                          Start date and time:2023-12-14 22:01:04 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 21s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Installer.msi
                          Detection:MAL
                          Classification:mal60.troj.evad.winMSI@6/23@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 23
                          • Number of non-executed functions: 39
                          Cookbook Comments:
                          • Found application associated with file extension: .msi
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded IPs from analysis (whitelisted): 104.91.175.50, 104.91.175.25, 104.91.175.59, 104.91.175.37, 104.91.175.32, 104.91.175.44, 104.91.175.51, 104.91.175.28, 104.91.175.27
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ocsps.ssl.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtWriteVirtualMemory calls found.
                          • VT rate limit hit for: Installer.msi
                          No simulations
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          172.232.186.251InstallerMC.msiGet hashmaliciousPikaBotBrowse
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AKAMAI-ASN1EUhttps://0c15ad52-a43103fa.boyarmilller.com/app/office365/exk7kpnt5q6Eao1uy697/sso/wsfed/passive?login_hint=sina.soltani%40amd.com&client-request-id=cf1ebe17-2150-4f20-9bd3-894964d84b11&username=sina.soltani%40amd.com&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx=estsredirect%3d2%26estsrequest%3drQQIARAA42Kw0skoKSkottLXL8gvKknM0cvNTC7KL85PK8nPy8nMS9VLzs_Vyy9Kz0wBsYqEuATE98mdD1BU8J99udMz5Ya34CpGZcJG6F9gZHzByDiJSaQ4My9Rrzg_pyQxL9MhMRds7C0mQf-idM-U8GK31JTUosSSzPy8R8xYlV5gEXjFwmTA-IOFcREr0DUxEV4HplmHek9zmLVDYhUzwylW_bTIohwTR7csH59KZ9fI0tIcN-OUEG_jvFKDqiQzgxyXHM_QilS_tLTEwkBbCyvDCWxCE9iYTrExfGBj7GBnmMXOcICT8QAvww--Z-0rp7-d-f-txwYBBgA1#Get hashmaliciousUnknownBrowse
                            • 172.233.190.246
                            https://2f464efd.b53045dfc6bde98ddc8c0341.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                            • 23.208.28.158
                            https://www.dropbox.com/scl/fi/vanar0qpcmj8zdmx4s08c/Circuits-Plus-Inc.-has-shared-a-document-with-you-via-PDF.paper?rlkey=aimalp5hl5bs9se1itohd7dt5&dl=0Get hashmaliciousHTMLPhisherBrowse
                            • 23.208.28.143
                            InstallerMC.msiGet hashmaliciousPikaBotBrowse
                            • 172.232.186.251
                            0749.pdf.msgGet hashmaliciousHTMLPhisherBrowse
                            • 23.204.76.112
                            31.dat.dllGet hashmaliciousPikaBotBrowse
                            • 172.232.175.59
                            31.dat.dllGet hashmaliciousPikaBotBrowse
                            • 172.232.175.59
                            FW_ Order confirmation PO12308 dated 06.12.2023.emlGet hashmaliciousUnknownBrowse
                            • 23.204.76.112
                            AWB_doc_.exeGet hashmaliciousFormBookBrowse
                            • 172.232.128.154
                            http://docksofts.comGet hashmaliciousUnknownBrowse
                            • 104.109.132.197
                            original (5).emlGet hashmaliciousHTMLPhisherBrowse
                            • 23.222.77.185
                            IF-07b_SIGS-EN-ICS-IC-002_SMC-SCU ICD_v31_19-03-2014.pdf.exeGet hashmaliciousUnknownBrowse
                            • 23.204.76.141
                            last.htaGet hashmaliciousAsyncRATBrowse
                            • 23.204.156.159
                            https://demandtechreports.com/reports/Flexential-TheEvolved922Download.jspGet hashmaliciousUnknownBrowse
                            • 23.56.5.144
                            https://t.infomail.microsoft.com/r/?id=h3d925265,3d340bb5,3d3443c1&e=b2NpZD1jbW1hbmlleDN4Mg&s=dOx08lLI2TRN0BIlw9eNEyJ6YErr6MWlNX0fFoH6-kQGet hashmaliciousHTMLPhisherBrowse
                            • 23.205.165.211
                            J8KIPSMGVN.exeGet hashmaliciousRedLineBrowse
                            • 172.234.57.195
                            https://poste.192-71-172-76.cprapid.com/it/Get hashmaliciousUnknownBrowse
                            • 23.44.193.58
                            FED-POL652663234.svgGet hashmaliciousUnknownBrowse
                            • 23.223.245.40
                            Mw1Toi3D0h.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
                            • 23.204.156.86
                            4lodHjhKT8.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
                            • 104.127.87.210
                            No context
                            No context
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8648
                            Entropy (8bit):5.593950058016029
                            Encrypted:false
                            SSDEEP:96:B1z3zvMkMeihtCUTeD2dARCsThqabUTeD2dARC6jLT+oTzeThqQHyzw2FlywctE6:B5DvMVeg11AkINI1AkAZ2cYAB1pj2
                            MD5:4459B1572F86E5D17C1AA19E301402DD
                            SHA1:745D5BA2599F6FB6699DD89F802E866F22FE2460
                            SHA-256:3D15163BC49E3609B1A2BA15426733D91F5630A2B5C70B869378E316CF44234D
                            SHA-512:BFF08D7F2F4974CD4D1BD3E3AC5F8D7A4E34AF64D4D9480E20B2380077B48FC34CCC8FF027D1DFA1BE7F9C081D6A287FCCDE71F9FACC4C529CF9CE4E96CD7BDC
                            Malicious:false
                            Reputation:low
                            Preview:...@IXOS.@.....@B..W.@.....@.....@.....@.....@.....@......&.{E8BC70D1-2863-4379-B219-8656E74FCC1E};.Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659..Installer.msi.@.....@....@.....@........&.{677686E8-D2EB-4231-BA61-36994AEA93B1}.....@.....@.....@.....@.......@.....@.....@.......@....;.Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{AA0FBF6B-45F7-443D-8835-BDF4F3E57D47}&.{E8BC70D1-2863-4379-B219-8656E74FCC1E}.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..&.C:\Users\user\AppData\Local\VcRedist\..../.C:\Users\user\AppData\Local\VcRedist\README.md....RegisterProduct..Registering product..[1]......C:\Windows\Installer\44d548.msi......C:\Windows\Installer\44d548.msi.@....$..@......Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634
                            Process:C:\Windows\SysWOW64\SearchProtocolHost.exe
                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 66791 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                            Category:dropped
                            Size (bytes):66791
                            Entropy (8bit):7.995531727155867
                            Encrypted:true
                            SSDEEP:1536:drFvD2YSE/sFDqV0FJJynkAhftCvMd3coa282frgW1qgNzU:drVDJSeaDqV0FJwLhVkr282fF5U
                            MD5:AC05D27423A85ADC1622C714F2CB6184
                            SHA1:B0FE2B1ABDDB97837EA0195BE70AB2FF14D43198
                            SHA-256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
                            SHA-512:6D0EF9050E41FBAE680E0E59DD0F90B6AC7FEA5579EF5708B69D5DA33A0ECE7E8B16574B58B17B64A34CC34A4FFC22B4A62C1ECE61F36C4A11A0665E0536B90D
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:MSCF............,...................I.................gW.e .authroot.stl..u/1.5..CK..<Tk...p.k:..c.Y:.(Qc...%Y.f_...$..DHn..6i/.]....-!QQ*..}f..f...}..1....9.......pN..mI.a.....!...N.....xP.f6..C.'#.c.@GN(3.<3.......9...('3...l.l....B..x..e...UWFU.TT.l.L...._.l1......w.\..Xb.v..Q......pKP.....M`.Y......Op4=.(=P.e...p.(U.....z7MF..O......V2.....#...pj...z.!...wQ...V&.Gz..Nv.4..y(J...A..':.2Q.^u.y..<.1..2..o........H.D.S.....62.| w(...B.......h.QZ..'....l.<....6..Z...p?... .pT.......l..S..K....FT?.....p..`.&..y..."T=l.n..egf.w..X.Y...G.m....=.}cO.7.....9....o..:.Y=.-.5....ud.J&.]..*Q..._<.S....{a.=.n...PT.Um).| kpyA....h.PXY.>.......^2U...H.....V<\...k..~....H..p...8..'..?...r>.4..!u......1\.`.<.+..n..p..]...).....L.g....#.<..c]R.U."\i.Z.>...`Q..g6....0.......F.........N.s.Z..A........m.^....a_..>v.-.mk...wt.n.:...>S..;....1...j.+m.&S......$.T...i.B=h.n...c.!e.....Y.#..bw.}...d.. ..w... .&..w.9..}k...\...=....{q.Up..y;..7.-.K.'.....
                            Process:C:\Windows\SysWOW64\SearchProtocolHost.exe
                            File Type:data
                            Category:modified
                            Size (bytes):330
                            Entropy (8bit):3.1210246516316165
                            Encrypted:false
                            SSDEEP:6:kKtEosurN+SkQlPlEGYRMY9z+4KlDA3RUeWc3l0:FEnPkPlE99SNxAhUeWcC
                            MD5:1FDAD253E1FBF3CB17A7269402DF64B2
                            SHA1:A2BC4115189925E7F278378DE5B98AE363C32413
                            SHA-256:55B8B18BE5ECED5203DEAF69D2A1D998D6BE5C7FE3D12829442C0915BD909575
                            SHA-512:0E29FC1E12955F0312EC3DBAFA4D95706D8A3F417A2D5562AB1AC9F777C2836173673A5E5D4E03518EB6FFA37ED63F7F25743DF3F8F3C3E46C22EE5CB46388BE
                            Malicious:false
                            Reputation:low
                            Preview:p...... .........kN.....(....................................................... ..........H"......(...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".3.f.e.4.e.6.1.a.4.8.2.2.d.a.1.:.0."...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):106
                            Entropy (8bit):4.76842425736778
                            Encrypted:false
                            SSDEEP:3:Sv9JvxtMLgN7qY0UxMFku2owAWRFmrIjoVKYwo94E:SvrYLI7nFMHZCmrUoVKYd4E
                            MD5:5E201DAC2E318092AE4F58540E053A49
                            SHA1:0901AA2298BC8F8E7244CEAA7075971FC9A76083
                            SHA-256:7E4C2A471969A9076992E17B4355558A5F029C651CFD535CA7C66076791A4E6A
                            SHA-512:7DF261FA670572ABEF14F8C88D021285C933C1CCEB394CEFC7D298B421F680B84578CEF2A345D9F015DB18061752AC0D1426C598C460714082B9AD313B32F792
                            Malicious:false
                            Reputation:low
                            Preview:# Chameleon Engine ( PAYLOAD GENERATOR NEW GEN )....Fast and Simply engine for generate payloads for spam!
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659., Template: Intel;1033, Revision Number: {677686E8-D2EB-4231-BA61-36994AEA93B1}, Create Time/Date: Thu Dec 14 13:58:56 2023, Last Saved Time/Date: Thu Dec 14 13:58:56 2023, Number of Pages: 400, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                            Category:dropped
                            Size (bytes):786432
                            Entropy (8bit):7.607314684857152
                            Encrypted:false
                            SSDEEP:12288:pTZ2EEko4IoVnBnVzoeOhFyFLgVNjDOX0VsCMd4UvZ9cA/KBOxP2:79VnToWLgVDTMdPn/KBV
                            MD5:1E3FF8672DD9DF37AC5696222FD0BEC7
                            SHA1:5437218F7389925A7EA5BC780D1351D6CE3EA067
                            SHA-256:0E81A36141D196401C46F6CE293A370E8F21C5E074DB5442FF2BA6F223C435F5
                            SHA-512:FE2A03675EFD005264E3750F8EAC22548031CF9B7327ADA206184027983B98758552EE222D81265FA000A4B1700DFC5D171FA8B3EA7A1229785F421C5438C09E
                            Malicious:false
                            Reputation:low
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659., Template: Intel;1033, Revision Number: {677686E8-D2EB-4231-BA61-36994AEA93B1}, Create Time/Date: Thu Dec 14 13:58:56 2023, Last Saved Time/Date: Thu Dec 14 13:58:56 2023, Number of Pages: 400, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                            Category:dropped
                            Size (bytes):786432
                            Entropy (8bit):7.607314684857152
                            Encrypted:false
                            SSDEEP:12288:pTZ2EEko4IoVnBnVzoeOhFyFLgVNjDOX0VsCMd4UvZ9cA/KBOxP2:79VnToWLgVDTMdPn/KBV
                            MD5:1E3FF8672DD9DF37AC5696222FD0BEC7
                            SHA1:5437218F7389925A7EA5BC780D1351D6CE3EA067
                            SHA-256:0E81A36141D196401C46F6CE293A370E8F21C5E074DB5442FF2BA6F223C435F5
                            SHA-512:FE2A03675EFD005264E3750F8EAC22548031CF9B7327ADA206184027983B98758552EE222D81265FA000A4B1700DFC5D171FA8B3EA7A1229785F421C5438C09E
                            Malicious:false
                            Reputation:low
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1804
                            Entropy (8bit):5.624559787943555
                            Encrypted:false
                            SSDEEP:48:7dHPrT7PrhfWhzP3FpQEeUvNnHiiuD4uEVlt+J6N:71z3zZWdReMCvD4uEP4q
                            MD5:34AD165E1B4A0F477F3157B85BF90376
                            SHA1:5A56E43604609CAE121B73EF0FCE12EBE6D53F88
                            SHA-256:5D90CF568348B54AA3A3E9754B3F6254CEE540581DA3518E495FC19EA4B9A515
                            SHA-512:6C17E0F381F7CD8D86C72F8CD195CD2F18B3573655F9D7797F60FF9A9146D3EE2DFE778D5A32C07F108C0B2016E7ED8B7B40DA68CAC8F7DDE68CF73EDC657877
                            Malicious:false
                            Preview:...@IXOS.@.....@;..W.@.....@.....@.....@.....@.....@......&.{E8BC70D1-2863-4379-B219-8656E74FCC1E};.Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659..Installer.msi.@.....@....@.....@........&.{677686E8-D2EB-4231-BA61-36994AEA93B1}.....@.....@.....@.....@.......@.....@.....@.......@....;.Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{AA0FBF6B-45F7-443D-8835-BDF4F3E57D47}/.C:\Users\user\AppData\Local\VcRedist\README.md.@.......@.....@.....@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@j....@.....@......&.C:\Users\user\AppData\Local\VcRedist\....1\......Please insert the disk: ..EaIxea0VE.cab.@.....@......C:\Windows\Installer\44d546.msi.........@........README.md..tq0dRhwGZl..README.md.@.....@j....@.......@.............@.........@.....@.....
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):675840
                            Entropy (8bit):7.795733158069968
                            Encrypted:false
                            SSDEEP:12288:EEko4IoVnBnVzoeOhFyFLgVNjDOX0VsCMd4UvZ9cA/KBOxP:E9VnToWLgVDTMdPn/KB
                            MD5:7092458FCFD6A24316B91318C2D36260
                            SHA1:41DD239D95DEE0E6E59C838B454F38642C423953
                            SHA-256:83C9BA686F57363DD27CB87419C8F5DC287ADAB4C3D0378CC19367D89274E1F7
                            SHA-512:251E52716C722C0530EE89CD87BD5AB63B4C7BAE81F105837BF7DF2160C3B6BC70C47A86DBDC599A200939EC7CC8854131316FACFCBC939E390D844714411A1A
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........a...a...a...r...a...a...a.d.k...a...o...a...`...a...r...a.d.j...a.4.g...a.d.e...a.Rich..a.................PE..L....8.N...........!.....0..........r........@.......................................(.......................................o...........Q..............h....@..`....................................................@...............................text.... .......0.................. ..`.rdata..%E...@...P...@..............@..@.data...DF....... ..................@....rsrc....Q.......`..................@..@.reloc..,/...@...0..................@..B.TEaOloc.....p.......@..................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.1626835114870153
                            Encrypted:false
                            SSDEEP:12:JSbX72Fj7tiAGiLIlHVRpiBh/7777777777777777777777777vDHFsLMzYBXnpH:JOQI5AkMMsF
                            MD5:EA9B34D05C8288B89C05A73CED0B3264
                            SHA1:F52939CF2048866326FE24128DF29006D57EB864
                            SHA-256:FE71968DAB6A3C4B924CBC5016FFD783458ED015E52B4EEBB1C0023CD642ABB1
                            SHA-512:01DCE21EFA3110433FE7C3BE3EF3895E0D4A675A2A76ECEF781CB49A928F990C1633A61B28CBE70B5671194BC17F579F8157A9D361D99A02EF1AF9981447F778
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.4419282414536245
                            Encrypted:false
                            SSDEEP:48:p8PhSuRc06WXJajT51jWS5oGrrTSI87ZBKN:khS1RjTnWOTUZB
                            MD5:8DA680176F1170DB044E3FEA36899755
                            SHA1:E00370626244AA24CF70EFAD630E1636C0540A0B
                            SHA-256:4A2B528A391C5CF625AB0B8DBFD2D566EAF8BFB5CC12A610A60CEF2FCA1CF134
                            SHA-512:D9801F6F867CAA5C7C66DB71DD1BB9D18CB7F62DC5203E9D693A7619AE730C29AD61485FB475D212157B323BFDFECF4087A0EA807E2FB32D064AECAC164E7BFB
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):432221
                            Entropy (8bit):5.3751740216890935
                            Encrypted:false
                            SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauW:zTtbmkExhMJCIpErf
                            MD5:FBE5B6708BCB168A19E9C69A35702AEA
                            SHA1:9EEE19C9A5B254EAD78AF2B573F7024D94B2BC46
                            SHA-256:E604E75E4C1240A5E2221B0F713A070BFA785DF3D372793B00F1399A9B9295FB
                            SHA-512:89F72EBB9907AB52A43DDFBE57BDA0CF6CC60BD420BB76A4A4590691A3CF243A6C2023A3316E31CA95B45F738CAD2DC55DFACD313E757F8120B471BD8BDEBDF0
                            Malicious:false
                            Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):1.1642326148909647
                            Encrypted:false
                            SSDEEP:48:nmxP6uqJveFXJtT50jWS5oGrrTSI87ZBKN:nY6EVT8WOTUZB
                            MD5:00062BAD6B8B7C39244C2827A6DFF9C6
                            SHA1:A10F6BEC63E562B1F5F3747087CAF06F23367979
                            SHA-256:B2A51676A1C5BA52D3F4705A6FEDB0A573936CB6472A011A8DB986DDBABDC9B4
                            SHA-512:A2FD32DF15F8FB99E4BA1EF41278061779C7A0043A5423037B0EBFE6C7F76CB12A73C69074E8E5A9D1DF050A8111025F063E5372FAFA0CB7704DC5A45B6EC327
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.4419282414536245
                            Encrypted:false
                            SSDEEP:48:p8PhSuRc06WXJajT51jWS5oGrrTSI87ZBKN:khS1RjTnWOTUZB
                            MD5:8DA680176F1170DB044E3FEA36899755
                            SHA1:E00370626244AA24CF70EFAD630E1636C0540A0B
                            SHA-256:4A2B528A391C5CF625AB0B8DBFD2D566EAF8BFB5CC12A610A60CEF2FCA1CF134
                            SHA-512:D9801F6F867CAA5C7C66DB71DD1BB9D18CB7F62DC5203E9D693A7619AE730C29AD61485FB475D212157B323BFDFECF4087A0EA807E2FB32D064AECAC164E7BFB
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:modified
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):1.1642326148909647
                            Encrypted:false
                            SSDEEP:48:nmxP6uqJveFXJtT50jWS5oGrrTSI87ZBKN:nY6EVT8WOTUZB
                            MD5:00062BAD6B8B7C39244C2827A6DFF9C6
                            SHA1:A10F6BEC63E562B1F5F3747087CAF06F23367979
                            SHA-256:B2A51676A1C5BA52D3F4705A6FEDB0A573936CB6472A011A8DB986DDBABDC9B4
                            SHA-512:A2FD32DF15F8FB99E4BA1EF41278061779C7A0043A5423037B0EBFE6C7F76CB12A73C69074E8E5A9D1DF050A8111025F063E5372FAFA0CB7704DC5A45B6EC327
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):69632
                            Entropy (8bit):0.09470461534055624
                            Encrypted:false
                            SSDEEP:24:OeMRZMAKk83ipVvipV7V2BwGI1lrkgq+J:p4ZBKk83S9S5oGrrqE
                            MD5:435C8817B725635073171AAB2A4B1D3F
                            SHA1:FEDC27493498DDD3B6C0681125546657DDA62AD3
                            SHA-256:0E932155099C2E4D17AAF7317FA564CA6CA81AD579FB6B9D3CB8F2BA8502B47F
                            SHA-512:1D91952260B9485292631C8EF66E0253C241A377CC6161C987DE1DF7804287C69BAAA14F5B8B82ECAA0325126B730351D65DDDDCC25F11F7198B6D97ED02AFCB
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.4419282414536245
                            Encrypted:false
                            SSDEEP:48:p8PhSuRc06WXJajT51jWS5oGrrTSI87ZBKN:khS1RjTnWOTUZB
                            MD5:8DA680176F1170DB044E3FEA36899755
                            SHA1:E00370626244AA24CF70EFAD630E1636C0540A0B
                            SHA-256:4A2B528A391C5CF625AB0B8DBFD2D566EAF8BFB5CC12A610A60CEF2FCA1CF134
                            SHA-512:D9801F6F867CAA5C7C66DB71DD1BB9D18CB7F62DC5203E9D693A7619AE730C29AD61485FB475D212157B323BFDFECF4087A0EA807E2FB32D064AECAC164E7BFB
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):0.07101630662971534
                            Encrypted:false
                            SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOgt24M11YBXLIiVky6l7:2F0i8n0itFzDHFsLMzYBX27
                            MD5:349CDA8D2FD0D29E0FB29113F60EEE6E
                            SHA1:840BA62FCD747ADE827C4088244A12809B3C163E
                            SHA-256:A0763C17CC38315ECBD3D1B560D146B7FDCE31F0F91E197A2A7F3BFE9E39A45C
                            SHA-512:EA8BDDC69EA869DAB6D70680908C2574A287A63380B19D5CD52ED71513359EB1A2AA695D80EF97B4F77424E9BAA5EF3DDB6FCB854155E76168F6818B53C3933E
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):1.1642326148909647
                            Encrypted:false
                            SSDEEP:48:nmxP6uqJveFXJtT50jWS5oGrrTSI87ZBKN:nY6EVT8WOTUZB
                            MD5:00062BAD6B8B7C39244C2827A6DFF9C6
                            SHA1:A10F6BEC63E562B1F5F3747087CAF06F23367979
                            SHA-256:B2A51676A1C5BA52D3F4705A6FEDB0A573936CB6472A011A8DB986DDBABDC9B4
                            SHA-512:A2FD32DF15F8FB99E4BA1EF41278061779C7A0043A5423037B0EBFE6C7F76CB12A73C69074E8E5A9D1DF050A8111025F063E5372FAFA0CB7704DC5A45B6EC327
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659, Author: Microsoft Corporation, Keywords: Installer, Comments: This installer database contains the logic and data required to install Microsoft Visual C++ 2013 Redistributable (64) - 12.0.39659., Template: Intel;1033, Revision Number: {677686E8-D2EB-4231-BA61-36994AEA93B1}, Create Time/Date: Thu Dec 14 13:58:56 2023, Last Saved Time/Date: Thu Dec 14 13:58:56 2023, Number of Pages: 400, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
                            Entropy (8bit):7.607314684857152
                            TrID:
                            • Microsoft Windows Installer (60509/1) 88.31%
                            • Generic OLE2 / Multistream Compound File (8008/1) 11.69%
                            File name:Installer.msi
                            File size:786'432 bytes
                            MD5:1e3ff8672dd9df37ac5696222fd0bec7
                            SHA1:5437218f7389925a7ea5bc780d1351d6ce3ea067
                            SHA256:0e81a36141d196401c46f6ce293a370e8f21c5e074db5442ff2ba6f223c435f5
                            SHA512:fe2a03675efd005264e3750f8eac22548031cf9b7327ada206184027983b98758552ee222d81265fa000a4b1700dfc5d171fa8b3ea7a1229785f421c5438c09e
                            SSDEEP:12288:pTZ2EEko4IoVnBnVzoeOhFyFLgVNjDOX0VsCMd4UvZ9cA/KBOxP2:79VnToWLgVDTMdPn/KBV
                            TLSH:D0F4020132998175F09D413C8EE243F4EFFFADA49E935A8BAB84B71D0C74B80652B765
                            File Content Preview:........................>......................................................................................................................................................................................................................................
                            Icon Hash:2d2e3797b32b2b99
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 14, 2023 22:02:10.676770926 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:10.880620956 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:10.880903959 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:10.894131899 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:11.143018007 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:11.181126118 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:11.181188107 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:11.181206942 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:11.181248903 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:12.000256062 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:12.205058098 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:12.205144882 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:12.210377932 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:12.210480928 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:02:12.414055109 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:12.414298058 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:12.415297985 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:12.415333033 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:13.832534075 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:02:13.832693100 CET497315632192.168.2.4172.232.186.251
                            Dec 14, 2023 22:03:28.845606089 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:03:28.845660925 CET563249731172.232.186.251192.168.2.4
                            Dec 14, 2023 22:03:28.845900059 CET497315632192.168.2.4172.232.186.251

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:22:01:51
                            Start date:14/12/2023
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Installer.msi"
                            Imagebase:0x7ff623ea0000
                            File size:69'632 bytes
                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:1
                            Start time:22:01:51
                            Start date:14/12/2023
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\msiexec.exe /V
                            Imagebase:0x7ff623ea0000
                            File size:69'632 bytes
                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:false

                            Target ID:2
                            Start time:22:01:52
                            Start date:14/12/2023
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding FB72CBA66D1B5B7C2EC1EC7FC50D4B55
                            Imagebase:0x290000
                            File size:59'904 bytes
                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:3
                            Start time:22:01:53
                            Start date:14/12/2023
                            Path:C:\Windows\SysWOW64\SearchProtocolHost.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\SearchProtocolHost.exe
                            Imagebase:0xb10000
                            File size:340'992 bytes
                            MD5 hash:727FE964E574EEAF8917308FFF0880DE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_PikaBot, Description: Yara detected PikaBot, Source: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:moderate
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:16.8%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:80.2%
                              Total number of Nodes:1685
                              Total number of Limit Nodes:44
                              execution_graph 16436 b48e94 16437 b48e88 16436->16437 16437->16436 16438 b444a0 3 API calls 16437->16438 16439 b49346 16438->16439 16440 b444a0 3 API calls 16439->16440 16441 b49353 16440->16441 16442 b444a0 3 API calls 16441->16442 16443 b49361 16442->16443 16444 b2d2d4 5 API calls 16443->16444 16445 b49373 16444->16445 16446 b2d2b3 4 API calls 16445->16446 16447 b49380 16446->16447 16448 b2d25a 2 API calls 16447->16448 16449 b493c3 16448->16449 16450 b2d25a 2 API calls 16449->16450 16451 b493d5 16450->16451 16452 b2d25a 2 API calls 16451->16452 16453 b493dc 16452->16453 16454 b35573 6 API calls 16453->16454 16456 b49532 16454->16456 16455 b49828 16456->16455 16457 b2bd20 3 API calls 16456->16457 16457->16455 14635 b222b3 14636 b222ad 14635->14636 14636->14635 14636->14636 14712 b3d5e1 14636->14712 14638 b2330e 14639 b24b24 14638->14639 14718 b4e50d 14638->14718 14644 b2d11f 2 API calls 14645 b2336b 14644->14645 14646 b2d11f 2 API calls 14645->14646 14647 b2337b 14646->14647 14779 b2d11f 14647->14779 14649 b23412 14650 b2d11f 2 API calls 14649->14650 14651 b23429 14650->14651 14652 b2d11f 2 API calls 14651->14652 14653 b23440 14652->14653 14654 b2d11f 2 API calls 14653->14654 14655 b2345a 14654->14655 14818 b444a0 14655->14818 14661 b234a2 14837 b2d25a 14661->14837 14664 b444a0 3 API calls 14665 b234cd 14664->14665 14666 b2d11f 2 API calls 14665->14666 14675 b234dd 14666->14675 14667 b2d11f 2 API calls 14667->14675 14668 b236ed 14669 b2d25a 2 API calls 14668->14669 14670 b2374c 14669->14670 14671 b2d11f 2 API calls 14670->14671 14672 b2377e 14671->14672 14784 b40a2d 14672->14784 14674 b23798 14842 b416c5 14674->14842 14675->14667 14675->14668 14677 b237d1 14678 b416c5 6 API calls 14677->14678 14679 b23812 14678->14679 14680 b416c5 6 API calls 14679->14680 14681 b23856 14680->14681 14808 b41aa6 14681->14808 14683 b23896 14683->14639 14684 b2d25a 2 API calls 14683->14684 14685 b2392d 14684->14685 14686 b444a0 3 API calls 14685->14686 14687 b23938 14686->14687 14688 b2d2d4 5 API calls 14687->14688 14689 b2394c 14688->14689 14690 b2d2b3 4 API calls 14689->14690 14691 b23959 14690->14691 14692 b2d25a 2 API calls 14691->14692 14693 b23985 14692->14693 14854 b2b343 14693->14854 14696 b24b03 14697 b2d25a 2 API calls 14696->14697 14698 b24b0a 14697->14698 14699 b2d25a 2 API calls 14698->14699 14700 b24b12 14699->14700 14701 b2d25a 2 API calls 14700->14701 14702 b24b1d 14701->14702 14703 b2d25a 2 API calls 14702->14703 14703->14639 14704 b4e50d 6 API calls 14711 b239a7 14704->14711 14705 b2d2d4 5 API calls 14705->14711 14706 b2d2b3 4 API calls 14706->14711 14707 b2d25a GetPEB HeapFree 14707->14711 14708 b2b343 6 API calls 14708->14711 14709 b444a0 GetPEB RtlAllocateHeap HeapFree 14709->14711 14711->14704 14711->14705 14711->14706 14711->14707 14711->14708 14711->14709 14879 b583ad 14711->14879 14713 b3d5ff 14712->14713 14714 b2d2d4 5 API calls 14713->14714 14715 b3d8ad 14714->14715 14716 b2d2b3 4 API calls 14715->14716 14717 b3d8ba 14716->14717 14717->14638 14717->14717 14719 b4e584 14718->14719 14720 b2d2d4 5 API calls 14719->14720 14721 b4e883 14720->14721 14722 b2d2b3 4 API calls 14721->14722 14723 b2331e 14722->14723 14724 b3c2e0 14723->14724 14725 b3c340 14724->14725 14944 b444cf 14725->14944 14728 b2d2d4 5 API calls 14729 b3d29b 14728->14729 14730 b2d2b3 4 API calls 14729->14730 14731 b3d2a8 GetVolumeInformationW 14730->14731 14732 b3d2b1 14731->14732 14733 b2d25a 2 API calls 14732->14733 14734 b3d2c8 14733->14734 14735 b2d11f 2 API calls 14734->14735 14736 b3d319 14735->14736 14737 b2d11f 2 API calls 14736->14737 14738 b3d328 14737->14738 14739 b2d11f 2 API calls 14738->14739 14740 b3d33b 14739->14740 14741 b2d11f 2 API calls 14740->14741 14742 b3d34d 14741->14742 14743 b2d11f 2 API calls 14742->14743 14744 b3d35d 14743->14744 14956 b1dd59 14744->14956 14746 b3d367 14967 b1d95c 14746->14967 14750 b3d3d2 14751 b444cf 6 API calls 14750->14751 14752 b3d422 14751->14752 14753 b2d2d4 5 API calls 14752->14753 14754 b3d43a 14753->14754 14755 b2d2b3 4 API calls 14754->14755 14756 b3d447 14755->14756 14757 b2d25a 2 API calls 14756->14757 14758 b3d461 14757->14758 14759 b2d25a 2 API calls 14758->14759 14760 b3d49a 14759->14760 14761 b2d25a 2 API calls 14760->14761 14762 b3d4a1 14761->14762 14763 b2d25a 2 API calls 14762->14763 14764 b3d4a9 14763->14764 14765 b2d25a 2 API calls 14764->14765 14766 b3d4b1 14765->14766 14767 b2d25a 2 API calls 14766->14767 14768 b3d4b9 14767->14768 14769 b2d11f 2 API calls 14768->14769 14770 b3d53f 14769->14770 14771 b23323 14770->14771 14772 b444cf 6 API calls 14770->14772 14771->14644 14773 b3d595 14772->14773 14774 b2d2d4 5 API calls 14773->14774 14775 b3d5b0 14774->14775 14776 b2d2b3 4 API calls 14775->14776 14777 b3d5bd 14776->14777 14778 b2d25a 2 API calls 14777->14778 14778->14771 14780 b2d13f 14779->14780 15024 b2d115 GetPEB 14780->15024 14782 b2d21a RtlAllocateHeap 14783 b2d22c 14782->14783 14783->14649 14783->14783 14785 b40e79 14784->14785 15025 b20c3e 14785->15025 14787 b4157e 14788 b444cf 6 API calls 14787->14788 14789 b4158c 14788->14789 14790 b444cf 6 API calls 14789->14790 14791 b41599 14790->14791 14792 b2d11f 2 API calls 14791->14792 14793 b415a8 14792->14793 14794 b2d2d4 5 API calls 14793->14794 14795 b4161e 14794->14795 14796 b2d2b3 4 API calls 14795->14796 14797 b4162b 14796->14797 14798 b2b343 6 API calls 14797->14798 14799 b4166e 14798->14799 14800 b2d25a 2 API calls 14799->14800 14801 b41697 14800->14801 14802 b2d25a 2 API calls 14801->14802 14803 b4169e 14802->14803 14804 b2d25a 2 API calls 14803->14804 14805 b416b9 14804->14805 14806 b2d25a 2 API calls 14805->14806 14807 b416c0 14806->14807 14807->14674 14809 b41b16 14808->14809 14810 b444a0 3 API calls 14809->14810 14811 b41d22 14810->14811 15144 b252d5 14811->15144 14813 b41d2d 14814 b2b343 6 API calls 14813->14814 14815 b41d51 14814->14815 14816 b2d25a 2 API calls 14815->14816 14817 b41d88 14816->14817 14817->14683 14819 b444aa 14818->14819 14820 b2d11f 2 API calls 14819->14820 14821 b444b3 14820->14821 14822 b2c5d6 3 API calls 14821->14822 14823 b2347f 14822->14823 14824 b2d2d4 14823->14824 14825 b2d304 14824->14825 14828 b2dc14 14825->14828 15246 b2d101 GetPEB 14825->15246 14827 b444a0 3 API calls 14829 b2eac1 LoadLibraryA 14827->14829 14828->14827 14831 b23495 14828->14831 14830 b2d25a 2 API calls 14829->14830 14830->14831 14832 b2d2b3 14831->14832 14833 b444a0 3 API calls 14832->14833 14834 b2d2bc GetProcAddress 14833->14834 14835 b2d25a 2 API calls 14834->14835 14836 b2d2cf 14835->14836 14836->14661 14838 b234c2 14837->14838 14839 b2d264 14837->14839 14838->14664 15247 b2d115 GetPEB 14839->15247 14841 b2d2aa HeapFree 14841->14838 14843 b416f1 14842->14843 14843->14843 14844 b444a0 3 API calls 14843->14844 14845 b41a02 14844->14845 14846 b444cf 6 API calls 14845->14846 14847 b41a0c 14846->14847 14848 b2b343 6 API calls 14847->14848 14849 b41a2a 14848->14849 14850 b2d25a 2 API calls 14849->14850 14851 b41a6f 14850->14851 14852 b2d25a 2 API calls 14851->14852 14853 b41a76 14852->14853 14853->14677 14855 b2b371 14854->14855 15248 b2ae0c 14855->15248 14858 b2ae0c 6 API calls 14859 b2bad9 14858->14859 14860 b2ae0c 6 API calls 14859->14860 14861 b2bae6 14860->14861 14862 b2bce2 14861->14862 14863 b2bb01 14861->14863 14865 b2d25a 2 API calls 14862->14865 15260 b1a6aa 14863->15260 14867 b2bd0a 14865->14867 14869 b2d25a 2 API calls 14867->14869 14870 b2bd11 14869->14870 14871 b2d25a 2 API calls 14870->14871 14872 b2399a 14871->14872 14872->14696 14872->14711 14873 b2bb1d 14874 b2d25a 2 API calls 14873->14874 14875 b2bcc5 14874->14875 14876 b2d25a 2 API calls 14875->14876 14877 b2bcd6 14876->14877 14878 b2d25a 2 API calls 14877->14878 14878->14872 14880 b58401 14879->14880 14881 b444a0 3 API calls 14880->14881 14884 b585af 14881->14884 14882 b2d25a 2 API calls 14883 b596fb 14882->14883 14883->14711 14885 b2d11f 2 API calls 14884->14885 14886 b593dd 14884->14886 14887 b5941b 14885->14887 14886->14882 14888 b444a0 3 API calls 14887->14888 14889 b5943a 14888->14889 14890 b444a0 3 API calls 14889->14890 14891 b59448 14890->14891 14892 b444a0 3 API calls 14891->14892 14893 b59455 14892->14893 14894 b444a0 3 API calls 14893->14894 14895 b59462 14894->14895 14896 b444a0 3 API calls 14895->14896 14897 b59470 14896->14897 14898 b444a0 3 API calls 14897->14898 14899 b5947e 14898->14899 14900 b444a0 3 API calls 14899->14900 14901 b5948c 14900->14901 14902 b444a0 3 API calls 14901->14902 14903 b5949a 14902->14903 14904 b444a0 3 API calls 14903->14904 14905 b594ab 14904->14905 14906 b594c0 14905->14906 14907 b594da 14905->14907 15272 b5339e 14906->15272 14909 b594f2 14907->14909 14910 b594e8 14907->14910 14912 b59500 14909->14912 14916 b59517 14909->14916 15302 b56297 14910->15302 15308 b51b26 14912->15308 14914 b2d25a 2 API calls 14930 b5960e 14914->14930 14915 b595d7 15481 b4fda0 14915->15481 14916->14915 14918 b5953d 14916->14918 14919 b5954c 14918->14919 14920 b59569 14918->14920 15357 b542b0 14919->15357 14922 b59592 14920->14922 14923 b59578 14920->14923 14926 b595a4 14922->14926 14928 b595b5 14922->14928 15400 b55a67 14923->15400 14925 b594d5 14925->14914 15418 b564dc 14926->15418 14928->14925 15426 b5682c 14928->15426 14931 b2d25a 2 API calls 14930->14931 14932 b596ad 14931->14932 14933 b2d25a 2 API calls 14932->14933 14934 b596b4 14933->14934 14935 b2d25a 2 API calls 14934->14935 14936 b596bb 14935->14936 14937 b2d25a 2 API calls 14936->14937 14938 b596c2 14937->14938 14939 b2d25a 2 API calls 14938->14939 14940 b596ca 14939->14940 14941 b2d25a 2 API calls 14940->14941 14942 b596d2 14941->14942 14943 b2d25a 2 API calls 14942->14943 14943->14886 14945 b444f9 14944->14945 14946 b2d11f 2 API calls 14945->14946 14947 b4451a 14946->14947 14948 b2d11f 2 API calls 14947->14948 14949 b44523 14948->14949 14992 b4447c 14949->14992 14952 b4452f 14996 b447bc 14952->14996 14953 b4456a 14954 b2d25a 2 API calls 14953->14954 14955 b3d268 14954->14955 14955->14728 14957 b1de0b 14956->14957 14958 b2d2d4 5 API calls 14957->14958 14959 b1dfe9 14958->14959 14960 b2d2b3 4 API calls 14959->14960 14961 b1dff6 GetComputerNameW 14960->14961 14962 b1e1d4 14961->14962 14963 b1e000 14961->14963 14962->14746 14964 b444cf 6 API calls 14963->14964 14965 b1e1a6 14964->14965 14966 b2d25a 2 API calls 14965->14966 14966->14962 14968 b1d980 14967->14968 14968->14968 14969 b2d2d4 5 API calls 14968->14969 14970 b1db7c 14969->14970 14971 b2d2b3 4 API calls 14970->14971 14972 b1db89 GetUserNameW 14971->14972 14973 b1dd54 14972->14973 14974 b1db93 14972->14974 14978 b1d1ff 14973->14978 14975 b444cf 6 API calls 14974->14975 14976 b1dd26 14975->14976 14977 b2d25a 2 API calls 14976->14977 14977->14973 14979 b1d28b 14978->14979 14980 b2d2d4 5 API calls 14979->14980 14981 b1d904 14980->14981 14982 b2d2b3 4 API calls 14981->14982 14983 b1d911 14982->14983 14984 b444cf 6 API calls 14983->14984 14985 b1d91e 14984->14985 14986 b2d2d4 5 API calls 14985->14986 14987 b1d92f 14986->14987 14988 b2d2b3 4 API calls 14987->14988 14989 b1d93c 14988->14989 14990 b2d25a 2 API calls 14989->14990 14991 b1d957 14990->14991 14991->14750 14993 b44485 14992->14993 15002 b2c5d6 14993->15002 14997 b44842 14996->14997 14998 b44a8a 14997->14998 14999 b2d2d4 5 API calls 14997->14999 14998->14953 15000 b44ac9 14999->15000 15001 b2d2b3 4 API calls 15000->15001 15001->14998 15003 b2c6bc 15002->15003 15008 b1c1d6 15003->15008 15009 b1c20f 15008->15009 15010 b2d11f 2 API calls 15009->15010 15013 b1c42c 15010->15013 15011 b2d25a 2 API calls 15012 b1ca2b 15011->15012 15014 b1ab69 15012->15014 15013->15011 15015 b1aba9 15014->15015 15015->15015 15020 b197f5 15015->15020 15017 b1ad70 15018 b2d25a 2 API calls 15017->15018 15019 b1b045 15018->15019 15019->14952 15021 b1981d 15020->15021 15021->15021 15022 b2d11f 2 API calls 15021->15022 15023 b19aa2 15022->15023 15023->15017 15024->14782 15026 b2d11f 2 API calls 15025->15026 15027 b20c50 15026->15027 15051 b20c56 15027->15051 15052 b1ceb2 15027->15052 15030 b1d1ff 6 API calls 15031 b20ce2 15030->15031 15032 b1d95c 7 API calls 15031->15032 15033 b20cf7 15032->15033 15034 b1dd59 7 API calls 15033->15034 15035 b20d02 15034->15035 15058 b1ec34 15035->15058 15039 b20d18 15068 b1f263 15039->15068 15041 b20d73 15075 b1ff5d 15041->15075 15051->14787 15053 b1cedc 15052->15053 15054 b2d2d4 5 API calls 15053->15054 15055 b1d1ee 15054->15055 15056 b2d2b3 4 API calls 15055->15056 15057 b1d1f8 15056->15057 15057->15030 15061 b1ec47 15058->15061 15059 b447bc 6 API calls 15060 b1edb8 15059->15060 15062 b1edbd 15060->15062 15061->15059 15063 b1ee52 15062->15063 15064 b2d2d4 5 API calls 15063->15064 15065 b1f23f 15064->15065 15066 b2d2b3 4 API calls 15065->15066 15067 b1f24a 15066->15067 15067->15039 15069 b1f2d3 15068->15069 15070 b2d2d4 5 API calls 15069->15070 15071 b1f53e 15070->15071 15072 b2d2b3 4 API calls 15071->15072 15073 b1f54b GlobalMemoryStatusEx 15072->15073 15074 b1f551 15073->15074 15074->15041 15076 b1ffa8 15075->15076 15077 b2d2d4 5 API calls 15076->15077 15078 b20149 15077->15078 15079 b2d2b3 4 API calls 15078->15079 15080 b20153 15079->15080 15081 b20157 15080->15081 15082 b20178 15081->15082 15083 b2d2d4 5 API calls 15082->15083 15084 b2099c 15083->15084 15085 b2d2b3 4 API calls 15084->15085 15086 b209a9 15085->15086 15087 b2d2d4 5 API calls 15086->15087 15088 b209b7 15087->15088 15089 b2d2b3 4 API calls 15088->15089 15090 b209c4 15089->15090 15091 b2d2d4 5 API calls 15090->15091 15096 b20a05 15090->15096 15093 b209e4 15091->15093 15092 b20c33 15101 b1f5be 15092->15101 15094 b2d2b3 4 API calls 15093->15094 15095 b209f1 GetTokenInformation 15094->15095 15095->15096 15096->15092 15096->15096 15097 b2d2d4 5 API calls 15096->15097 15098 b20c27 15097->15098 15099 b2d2b3 4 API calls 15098->15099 15100 b20c31 FindCloseChangeNotification 15099->15100 15100->15092 15102 b1f636 15101->15102 15103 b2d2d4 5 API calls 15102->15103 15104 b1fd03 15103->15104 15105 b2d2b3 4 API calls 15104->15105 15106 b1fd10 15105->15106 15107 b1fef2 15106->15107 15117 b1fd1a 15106->15117 15108 b2d2d4 5 API calls 15107->15108 15109 b1ff02 15108->15109 15110 b2d2b3 4 API calls 15109->15110 15111 b1ff0f 15110->15111 15112 b444cf 6 API calls 15111->15112 15113 b1ff1c 15112->15113 15114 b2d2d4 5 API calls 15113->15114 15115 b1ff33 15114->15115 15116 b2d2b3 4 API calls 15115->15116 15119 b1ff3d 15116->15119 15118 b444cf 6 API calls 15117->15118 15122 b1feb2 15118->15122 15120 b2d25a 2 API calls 15119->15120 15121 b1fee6 15120->15121 15124 b1e205 15121->15124 15123 b2d25a 2 API calls 15122->15123 15123->15121 15125 b1e2bd 15124->15125 15126 b2d2d4 5 API calls 15125->15126 15127 b1e4c5 15126->15127 15128 b2d2b3 4 API calls 15127->15128 15130 b1e4d2 15128->15130 15129 b1e6b5 15134 b1e6b9 15129->15134 15130->15129 15131 b444cf 6 API calls 15130->15131 15132 b1e687 15131->15132 15133 b2d25a 2 API calls 15132->15133 15133->15129 15135 b1e710 15134->15135 15136 b2d2d4 5 API calls 15135->15136 15137 b1e9d5 15136->15137 15138 b2d2b3 4 API calls 15137->15138 15140 b1e9e2 15138->15140 15139 b1e9e8 15139->15051 15140->15139 15140->15140 15141 b444cf 6 API calls 15140->15141 15142 b1ebc8 15141->15142 15143 b2d25a 2 API calls 15142->15143 15143->15139 15145 b25353 15144->15145 15146 b2d2d4 5 API calls 15145->15146 15147 b26a9f 15146->15147 15148 b2d2b3 4 API calls 15147->15148 15149 b26aac CreateToolhelp32Snapshot 15148->15149 15150 b26ac5 15149->15150 15195 b26aba 15149->15195 15151 b2d2d4 5 API calls 15150->15151 15152 b26ae2 15151->15152 15153 b2d2b3 4 API calls 15152->15153 15154 b26aef Process32FirstW 15153->15154 15155 b26de9 15154->15155 15169 b26af9 15154->15169 15156 b444cf 6 API calls 15155->15156 15157 b26dfb 15156->15157 15158 b444cf 6 API calls 15157->15158 15159 b26e0b 15158->15159 15160 b444cf 6 API calls 15159->15160 15161 b26e1c 15160->15161 15162 b444cf 6 API calls 15161->15162 15163 b26e2d 15162->15163 15164 b2d2d4 5 API calls 15163->15164 15165 b26e42 15164->15165 15166 b2d2b3 4 API calls 15165->15166 15167 b26e4f 15166->15167 15196 b25261 15167->15196 15170 b2d2d4 5 API calls 15169->15170 15171 b26ddc 15170->15171 15172 b2d2b3 4 API calls 15171->15172 15172->15155 15174 b2d2b3 GetPEB RtlAllocateHeap HeapFree GetProcAddress 15175 b26e90 15174->15175 15175->15174 15176 b2d2d4 GetPEB GetPEB RtlAllocateHeap HeapFree LoadLibraryA 15175->15176 15177 b2d2b3 4 API calls 15175->15177 15200 b24dbf 15175->15200 15176->15175 15178 b27700 Process32NextW 15177->15178 15178->15175 15179 b27711 15178->15179 15180 b2d2d4 5 API calls 15179->15180 15181 b2772a 15180->15181 15182 b2d2b3 4 API calls 15181->15182 15183 b27737 15182->15183 15184 b2d25a 2 API calls 15183->15184 15185 b277a4 15184->15185 15186 b2d25a 2 API calls 15185->15186 15187 b277ab 15186->15187 15188 b2d25a 2 API calls 15187->15188 15189 b277b6 15188->15189 15190 b2d25a 2 API calls 15189->15190 15191 b277bd 15190->15191 15192 b2d2d4 5 API calls 15191->15192 15193 b277d5 15192->15193 15194 b2d2b3 4 API calls 15193->15194 15194->15195 15195->14813 15197 b25281 15196->15197 15197->15197 15210 b597b1 15197->15210 15199 b252cd 15199->15175 15202 b24e30 15200->15202 15201 b251f4 15201->15175 15202->15201 15202->15202 15239 b597d9 15202->15239 15229 b59710 15210->15229 15212 b597bb 15213 b59710 7 API calls 15212->15213 15214 b597c5 15213->15214 15215 b59710 7 API calls 15214->15215 15216 b597ca 15215->15216 15217 b597cf 15216->15217 15218 b59710 7 API calls 15216->15218 15219 b59710 7 API calls 15217->15219 15218->15217 15220 b597d4 15219->15220 15221 b597d9 15220->15221 15222 b59710 7 API calls 15220->15222 15223 b59710 7 API calls 15221->15223 15222->15221 15224 b597de 15223->15224 15225 b597e3 15224->15225 15226 b59710 7 API calls 15224->15226 15227 b59710 7 API calls 15225->15227 15226->15225 15228 b597ed 15227->15228 15230 b59732 15229->15230 15233 b4f5d4 15230->15233 15232 b59752 NtPssCaptureVaSpaceBulk 15232->15212 15234 b4f5f5 15233->15234 15235 b2d2d4 5 API calls 15234->15235 15236 b4fae2 15235->15236 15237 b2d2b3 4 API calls 15236->15237 15238 b4faef 15237->15238 15238->15232 15240 b59710 7 API calls 15239->15240 15241 b597de 15240->15241 15242 b597e3 15241->15242 15243 b59710 7 API calls 15241->15243 15244 b59710 7 API calls 15242->15244 15243->15242 15245 b597ed 15244->15245 15246->14828 15247->14841 15249 b2ae40 15248->15249 15250 b2d11f 2 API calls 15249->15250 15251 b2b26b 15250->15251 15252 b2d11f 2 API calls 15251->15252 15253 b2b275 15252->15253 15254 b2d2d4 5 API calls 15253->15254 15255 b2b29f 15254->15255 15256 b2d2b3 4 API calls 15255->15256 15257 b2b2ac 15256->15257 15258 b2d25a 2 API calls 15257->15258 15259 b2b33c 15258->15259 15259->14858 15261 b1a6d5 15260->15261 15261->15261 15262 b197f5 2 API calls 15261->15262 15265 b1a849 15262->15265 15263 b2d25a 2 API calls 15264 b1ab62 15263->15264 15266 b1b2ed 15264->15266 15265->15263 15267 b1b312 15266->15267 15268 b2d11f 2 API calls 15267->15268 15271 b1b5bf 15268->15271 15269 b2d25a 2 API calls 15270 b1c1cf 15269->15270 15270->14873 15271->15269 15271->15271 15273 b53420 15272->15273 15273->15273 15274 b2d11f 2 API calls 15273->15274 15275 b5406b 15274->15275 15276 b2d11f 2 API calls 15275->15276 15277 b54082 15276->15277 15278 b2d11f 2 API calls 15277->15278 15280 b5409b 15278->15280 15279 b2d25a 2 API calls 15281 b542a4 15279->15281 15282 b444a0 3 API calls 15280->15282 15298 b5423f 15280->15298 15283 b2d25a 2 API calls 15281->15283 15284 b540c7 15282->15284 15285 b542ab 15283->15285 15286 b2d2d4 5 API calls 15284->15286 15285->14925 15287 b540e1 15286->15287 15288 b2d2b3 4 API calls 15287->15288 15289 b540ee 15288->15289 15290 b2d25a 2 API calls 15289->15290 15291 b5410b 15290->15291 15292 b2b343 6 API calls 15291->15292 15294 b5411c 15292->15294 15293 b541db 15583 b4a52e 15293->15583 15294->15293 15295 b1c1d6 3 API calls 15294->15295 15297 b5419f 15295->15297 15531 b277ed 15297->15531 15298->15279 15301 b2b343 6 API calls 15301->15293 15303 b562e3 15302->15303 15304 b2d2d4 5 API calls 15303->15304 15305 b564ce 15304->15305 15306 b2d2b3 4 API calls 15305->15306 15307 b564d8 15306->15307 15307->14925 15311 b51b7b 15308->15311 15309 b2d11f 2 API calls 15310 b52c93 15309->15310 15312 b2d11f 2 API calls 15310->15312 15311->15311 15315 b444a0 3 API calls 15311->15315 15334 b52c14 15311->15334 15313 b52ca3 15312->15313 15314 b2d11f 2 API calls 15313->15314 15316 b52cb3 15314->15316 15326 b52b8a 15315->15326 15317 b2d11f 2 API calls 15316->15317 15323 b52cc3 15317->15323 15318 b2d25a 2 API calls 15319 b5333e 15318->15319 15320 b2d25a 2 API calls 15319->15320 15321 b53346 15320->15321 15322 b2d25a 2 API calls 15321->15322 15324 b5334e 15322->15324 15325 b444a0 3 API calls 15323->15325 15350 b532e0 15323->15350 15327 b2d25a 2 API calls 15324->15327 15328 b52d2a 15325->15328 15331 b2d25a 2 API calls 15326->15331 15329 b5339a 15327->15329 15330 b2d2d4 5 API calls 15328->15330 15329->14925 15332 b52d48 15330->15332 15331->15334 15333 b2d2b3 4 API calls 15332->15333 15335 b52d55 15333->15335 15334->15309 15336 b2d25a 2 API calls 15335->15336 15337 b52d72 15336->15337 15338 b2b343 6 API calls 15337->15338 15347 b52d82 15338->15347 15339 b531c4 15340 b444a0 3 API calls 15339->15340 15341 b5327c 15340->15341 15342 b2d25a 2 API calls 15341->15342 15343 b532ae 15342->15343 15344 b2b343 6 API calls 15343->15344 15345 b532c1 15344->15345 15346 b4a52e 6 API calls 15345->15346 15346->15350 15347->15339 15347->15347 15348 b2d2d4 5 API calls 15347->15348 15349 b53197 15348->15349 15351 b2d2b3 4 API calls 15349->15351 15350->15318 15352 b531a4 15351->15352 15353 b531b1 15352->15353 15354 b531c8 15352->15354 15599 b4ae0c 15353->15599 15354->15339 15656 b4db10 15354->15656 15358 b542eb 15357->15358 15358->15358 15359 b444a0 3 API calls 15358->15359 15360 b5500e 15359->15360 15361 b2d25a 2 API calls 15360->15361 15362 b55040 15361->15362 15363 b444a0 3 API calls 15362->15363 15364 b5504b 15363->15364 15365 b444a0 3 API calls 15364->15365 15366 b55059 15365->15366 15367 b444a0 3 API calls 15366->15367 15368 b55067 15367->15368 15369 b444a0 3 API calls 15368->15369 15374 b55077 15369->15374 15370 b2d11f 2 API calls 15371 b555c8 15370->15371 15372 b2d11f 2 API calls 15371->15372 15376 b555df 15372->15376 15373 b553d1 15373->15370 15374->15373 15374->15374 15375 b444cf 6 API calls 15374->15375 15375->15373 15377 b557e4 15376->15377 15384 b5561e 15376->15384 15380 b277ed 6 API calls 15377->15380 15378 b2b343 6 API calls 15379 b55939 15378->15379 15381 b4a52e 6 API calls 15379->15381 15382 b558ef 15380->15382 15387 b55978 15381->15387 15383 b2d25a 2 API calls 15382->15383 15386 b55795 15383->15386 15385 b252d5 10 API calls 15384->15385 15384->15386 15385->15386 15386->15378 15386->15387 15388 b2d25a 2 API calls 15387->15388 15389 b55a33 15388->15389 15390 b2d25a 2 API calls 15389->15390 15391 b55a3a 15390->15391 15392 b2d25a 2 API calls 15391->15392 15393 b55a41 15392->15393 15394 b2d25a 2 API calls 15393->15394 15395 b55a49 15394->15395 15396 b2d25a 2 API calls 15395->15396 15397 b55a51 15396->15397 15398 b2d25a 2 API calls 15397->15398 15399 b55a59 15398->15399 15399->14925 15401 b55ab9 15400->15401 15402 b444a0 3 API calls 15401->15402 15403 b560f0 15402->15403 15404 b2d25a 2 API calls 15403->15404 15405 b56116 15404->15405 15406 b2d11f 2 API calls 15405->15406 15407 b56121 15406->15407 15408 b444a0 3 API calls 15407->15408 15409 b56140 15408->15409 15410 b2d25a 2 API calls 15409->15410 15411 b5616f 15410->15411 15412 b2b343 6 API calls 15411->15412 15413 b561d0 15412->15413 15414 b4a52e 6 API calls 15413->15414 15415 b5623c 15414->15415 15416 b2d25a 2 API calls 15415->15416 15417 b56292 15416->15417 15417->14925 15419 b56535 15418->15419 15420 b444a0 3 API calls 15419->15420 15425 b56686 15420->15425 15421 b56802 15422 b2d25a 2 API calls 15421->15422 15424 b56827 15422->15424 15424->14925 15425->15421 15762 b42702 15425->15762 15427 b56858 15426->15427 15427->15427 15428 b444a0 3 API calls 15427->15428 15429 b57535 15428->15429 15430 b2d11f 2 API calls 15429->15430 15431 b57597 15430->15431 15432 b2d11f 2 API calls 15431->15432 15433 b575ac 15432->15433 15434 b2d11f 2 API calls 15433->15434 15435 b575cb 15434->15435 15812 b4982e 15435->15812 15438 b444cf 6 API calls 15439 b5761f 15438->15439 15440 b444cf 6 API calls 15439->15440 15441 b57630 15440->15441 15834 b3d929 15441->15834 15442 b5830a 15443 b2d25a 2 API calls 15442->15443 15444 b58376 15443->15444 15447 b2d25a 2 API calls 15444->15447 15446 b5764a 15453 b57db4 15446->15453 15470 b57656 15446->15470 15448 b5837d 15447->15448 15449 b2d25a 2 API calls 15448->15449 15450 b58385 15449->15450 15451 b2d25a 2 API calls 15450->15451 15452 b583a6 15451->15452 15452->14925 15453->15453 15454 b444cf 6 API calls 15453->15454 15455 b58226 15454->15455 15456 b2d2d4 5 API calls 15455->15456 15457 b58247 15456->15457 15458 b2d2b3 4 API calls 15457->15458 15459 b57daf 15458->15459 15460 b2d25a 2 API calls 15459->15460 15461 b5826f 15460->15461 15462 b2d25a 2 API calls 15461->15462 15463 b5828f 15462->15463 15464 b3aafc 6 API calls 15463->15464 15465 b582a9 15464->15465 15466 b2d25a 2 API calls 15465->15466 15467 b582ef 15466->15467 15468 b2d25a 2 API calls 15467->15468 15469 b582f6 15468->15469 15858 b3e441 15469->15858 15472 b444cf 6 API calls 15470->15472 15473 b57d38 15472->15473 15474 b444cf 6 API calls 15473->15474 15475 b57d45 15474->15475 15476 b2d2d4 5 API calls 15475->15476 15477 b57d70 15476->15477 15478 b2d2b3 4 API calls 15477->15478 15479 b57d7d 15478->15479 15480 b2d25a 2 API calls 15479->15480 15480->15459 15482 b4fe48 15481->15482 15483 b444a0 3 API calls 15482->15483 15530 b5159d 15482->15530 15484 b513ae 15483->15484 15485 b2d25a 2 API calls 15484->15485 15486 b51463 15485->15486 15487 b2d11f 2 API calls 15486->15487 15489 b51487 15487->15489 15488 b2d2d4 5 API calls 15490 b5197c 15488->15490 15492 b2d11f 2 API calls 15489->15492 15491 b2d2b3 4 API calls 15490->15491 15493 b51989 15491->15493 15494 b51497 15492->15494 16021 b4556c 15493->16021 15495 b2d11f 2 API calls 15494->15495 15496 b514a7 15495->15496 15499 b2d11f 2 API calls 15496->15499 15497 b519a7 15502 b444a0 3 API calls 15497->15502 15500 b514b9 15499->15500 15501 b2d11f 2 API calls 15500->15501 15516 b514da 15501->15516 15509 b51a48 15502->15509 15503 b2d25a 2 API calls 15504 b51b04 15503->15504 15505 b2d25a 2 API calls 15504->15505 15506 b51b0b 15505->15506 15507 b2d25a 2 API calls 15506->15507 15508 b51b13 15507->15508 15510 b2d25a 2 API calls 15508->15510 15512 b2d25a 2 API calls 15509->15512 15511 b51b1b 15510->15511 15513 b2d25a 2 API calls 15511->15513 15514 b51a77 15512->15514 15515 b51b22 15513->15515 15517 b2b343 6 API calls 15514->15517 15515->14925 15518 b444a0 3 API calls 15516->15518 15525 b51aa8 15516->15525 15519 b51a87 15517->15519 15520 b51542 15518->15520 15521 b4a52e 6 API calls 15519->15521 15522 b2d2d4 5 API calls 15520->15522 15521->15525 15523 b51562 15522->15523 15524 b2d2b3 4 API calls 15523->15524 15526 b5156f 15524->15526 15525->15503 15527 b2d25a 2 API calls 15526->15527 15528 b5158c 15527->15528 15529 b2b343 6 API calls 15528->15529 15529->15530 15530->15488 15530->15497 15532 b27821 15531->15532 15532->15532 15533 b2d2d4 5 API calls 15532->15533 15534 b28c51 15533->15534 15535 b2d2b3 4 API calls 15534->15535 15536 b28c5e 15535->15536 15537 b2d2d4 5 API calls 15536->15537 15565 b28c64 15536->15565 15538 b28e1c 15537->15538 15539 b2d2b3 4 API calls 15538->15539 15540 b28e29 15539->15540 15556 b28e33 15540->15556 15568 b2927e 15540->15568 15541 b2a0a9 15542 b2d2d4 5 API calls 15541->15542 15543 b2a0b7 15542->15543 15544 b2d2b3 4 API calls 15543->15544 15545 b2a0c4 15544->15545 15546 b2d2d4 5 API calls 15545->15546 15547 b2a0d7 15546->15547 15548 b2d2b3 4 API calls 15547->15548 15549 b2a0e4 15548->15549 15550 b2d2d4 5 API calls 15549->15550 15551 b2a0f4 15550->15551 15552 b2d2b3 4 API calls 15551->15552 15553 b2a101 15552->15553 15554 b2d2d4 5 API calls 15553->15554 15555 b2a10e 15554->15555 15557 b2d2b3 4 API calls 15555->15557 15558 b2d2d4 5 API calls 15556->15558 15557->15565 15559 b2924a 15558->15559 15560 b2d2b3 4 API calls 15559->15560 15561 b29257 15560->15561 15562 b2d2d4 5 API calls 15561->15562 15563 b29267 15562->15563 15564 b2d2b3 4 API calls 15563->15564 15564->15565 15565->15301 15566 b2d2b3 GetPEB RtlAllocateHeap HeapFree GetProcAddress 15566->15568 15567 b2d2d4 GetPEB GetPEB RtlAllocateHeap HeapFree LoadLibraryA 15567->15568 15568->15541 15568->15566 15568->15567 15569 b2a128 15568->15569 15570 b2d2d4 5 API calls 15569->15570 15571 b2aab8 15570->15571 15572 b2d2b3 4 API calls 15571->15572 15573 b2aac5 15572->15573 15574 b2d2d4 5 API calls 15573->15574 15575 b2aad8 15574->15575 15576 b2d2b3 4 API calls 15575->15576 15577 b2aae5 15576->15577 15578 b2d2d4 5 API calls 15577->15578 15579 b2aaf5 15578->15579 15580 b2d2b3 4 API calls 15579->15580 15581 b2ab02 15580->15581 15582 b2d2d4 5 API calls 15581->15582 15582->15555 15584 b4a579 15583->15584 15585 b4ad6b 15584->15585 15586 b444a0 3 API calls 15584->15586 15585->15298 15587 b4acc0 15586->15587 15588 b444a0 3 API calls 15587->15588 15589 b4accd 15588->15589 15590 b2d2d4 5 API calls 15589->15590 15591 b4aceb 15590->15591 15592 b2d2b3 4 API calls 15591->15592 15593 b4acf8 15592->15593 15594 b2b343 6 API calls 15593->15594 15595 b4ad1d 15594->15595 15596 b2d25a 2 API calls 15595->15596 15597 b4ad64 15596->15597 15598 b2d25a 2 API calls 15597->15598 15598->15585 15600 b4ae97 15599->15600 15602 b4cd7f 15600->15602 15670 b2ef16 15600->15670 15603 b2d2d4 5 API calls 15602->15603 15648 b4cd89 15602->15648 15604 b4ce4a 15603->15604 15605 b2d2b3 4 API calls 15604->15605 15606 b4ce58 15605->15606 15607 b2d11f 2 API calls 15606->15607 15608 b4ce63 15607->15608 15609 b2d2d4 5 API calls 15608->15609 15610 b4ce8a 15609->15610 15611 b2d2b3 4 API calls 15610->15611 15612 b4ce98 15611->15612 15613 b2d2d4 5 API calls 15612->15613 15614 b4cf55 15613->15614 15615 b2d2b3 4 API calls 15614->15615 15652 b4cf63 15615->15652 15616 b4d7e6 15617 b2d2d4 5 API calls 15616->15617 15618 b4d876 15617->15618 15619 b2d2b3 4 API calls 15618->15619 15620 b4d884 15619->15620 15621 b4d940 15620->15621 15625 b4d88e 15620->15625 15622 b2d2d4 5 API calls 15621->15622 15623 b4d953 15622->15623 15624 b2d2b3 4 API calls 15623->15624 15626 b4d961 15624->15626 15625->15625 15627 b2d25a 2 API calls 15625->15627 15629 b2d25a 2 API calls 15626->15629 15628 b4d92a 15627->15628 15628->15648 15697 b597cf 15628->15697 15630 b4d96f 15629->15630 15632 b597cf 7 API calls 15630->15632 15633 b4d984 15630->15633 15632->15633 15634 b597b1 7 API calls 15633->15634 15635 b4d9e0 15634->15635 15708 b59793 15635->15708 15648->15339 15652->15616 15653 b2d2d4 5 API calls 15652->15653 15654 b4d7d8 15653->15654 15655 b2d2b3 4 API calls 15654->15655 15655->15616 15657 b4db8d 15656->15657 15658 b597d9 7 API calls 15657->15658 15659 b4e12e 15658->15659 15660 b1c1d6 3 API calls 15659->15660 15669 b4e136 15659->15669 15661 b4e1b5 15660->15661 15739 b597a7 15661->15739 15669->15339 15671 b2ef42 15670->15671 15671->15671 15672 b2d2d4 5 API calls 15671->15672 15673 b2f837 15672->15673 15674 b2d2b3 4 API calls 15673->15674 15675 b2f844 15674->15675 15676 b2d2d4 5 API calls 15675->15676 15677 b2f85c 15676->15677 15678 b2d2b3 4 API calls 15677->15678 15683 b2f869 15678->15683 15679 b3018d 15680 b2d2d4 5 API calls 15679->15680 15681 b3019b 15680->15681 15682 b2d2b3 4 API calls 15681->15682 15696 b301a8 15682->15696 15683->15679 15684 b2d2d4 5 API calls 15683->15684 15685 b2fab5 15684->15685 15686 b2d2b3 4 API calls 15685->15686 15691 b2fac2 15686->15691 15687 b444cf 6 API calls 15687->15691 15688 b2d2b3 GetPEB RtlAllocateHeap HeapFree GetProcAddress 15688->15691 15689 b2d25a 2 API calls 15689->15691 15690 b2d2d4 GetPEB GetPEB RtlAllocateHeap HeapFree LoadLibraryA 15690->15691 15691->15679 15691->15687 15691->15688 15691->15689 15691->15690 15692 b300b5 15691->15692 15693 b2d2d4 5 API calls 15692->15693 15694 b303ef 15693->15694 15695 b2d2b3 4 API calls 15694->15695 15695->15696 15696->15602 15698 b59710 7 API calls 15697->15698 15699 b597d4 15698->15699 15700 b597d9 15699->15700 15701 b59710 7 API calls 15699->15701 15702 b59710 7 API calls 15700->15702 15701->15700 15703 b597de 15702->15703 15704 b597e3 15703->15704 15705 b59710 7 API calls 15703->15705 15706 b59710 7 API calls 15704->15706 15705->15704 15707 b597ed 15706->15707 15709 b59710 7 API calls 15708->15709 15710 b59798 15709->15710 15711 b5979d 15710->15711 15712 b59710 7 API calls 15710->15712 15713 b59710 7 API calls 15711->15713 15712->15711 15714 b597a2 15713->15714 15715 b597a7 15714->15715 15716 b59710 7 API calls 15714->15716 15717 b59710 7 API calls 15715->15717 15716->15715 15718 b597ac 15717->15718 15719 b597b1 15718->15719 15720 b59710 7 API calls 15718->15720 15721 b59710 7 API calls 15719->15721 15720->15719 15722 b597bb 15721->15722 15723 b59710 7 API calls 15722->15723 15724 b597c5 15723->15724 15725 b59710 7 API calls 15724->15725 15726 b597ca 15725->15726 15727 b597cf 15726->15727 15728 b59710 7 API calls 15726->15728 15729 b59710 7 API calls 15727->15729 15728->15727 15730 b597d4 15729->15730 15731 b597d9 15730->15731 15732 b59710 7 API calls 15730->15732 15733 b59710 7 API calls 15731->15733 15732->15731 15734 b597de 15733->15734 15735 b597e3 15734->15735 15736 b59710 7 API calls 15734->15736 15737 b59710 7 API calls 15735->15737 15736->15735 15738 b597ed 15737->15738 15740 b59710 7 API calls 15739->15740 15741 b597ac 15740->15741 15742 b597b1 15741->15742 15743 b59710 7 API calls 15741->15743 15744 b59710 7 API calls 15742->15744 15743->15742 15745 b597bb 15744->15745 15746 b59710 7 API calls 15745->15746 15747 b597c5 15746->15747 15748 b59710 7 API calls 15747->15748 15749 b597ca 15748->15749 15750 b597cf 15749->15750 15751 b59710 7 API calls 15749->15751 15752 b59710 7 API calls 15750->15752 15751->15750 15753 b597d4 15752->15753 15754 b597d9 15753->15754 15755 b59710 7 API calls 15753->15755 15756 b59710 7 API calls 15754->15756 15755->15754 15757 b597de 15756->15757 15758 b597e3 15757->15758 15759 b59710 7 API calls 15757->15759 15760 b59710 7 API calls 15758->15760 15759->15758 15761 b597ed 15760->15761 15763 b4274e 15762->15763 15763->15763 15764 b2d11f 2 API calls 15763->15764 15765 b43350 15764->15765 15766 b2d11f 2 API calls 15765->15766 15767 b43365 15766->15767 15768 b2d11f 2 API calls 15767->15768 15769 b4337e 15768->15769 15770 b444a0 3 API calls 15769->15770 15771 b4338c 15770->15771 15772 b444cf 6 API calls 15771->15772 15773 b43399 15772->15773 15774 b444cf 6 API calls 15773->15774 15775 b433a7 15774->15775 15776 b444cf 6 API calls 15775->15776 15777 b433b5 15776->15777 15778 b2d2d4 5 API calls 15777->15778 15779 b433c9 15778->15779 15780 b2d2b3 4 API calls 15779->15780 15781 b433d6 15780->15781 15798 b3aafc 15781->15798 15783 b43434 15784 b2d25a 2 API calls 15783->15784 15785 b4348e 15784->15785 15786 b2d25a 2 API calls 15785->15786 15787 b43496 15786->15787 15788 b2d25a 2 API calls 15787->15788 15789 b4349e 15788->15789 15790 b2d25a 2 API calls 15789->15790 15791 b434a6 15790->15791 15792 b2d25a 2 API calls 15791->15792 15793 b434fb 15792->15793 15794 b2d25a 2 API calls 15793->15794 15795 b43502 15794->15795 15796 b2d25a 2 API calls 15795->15796 15797 b43509 15796->15797 15797->15421 15799 b3ab30 15798->15799 15800 b2d2d4 5 API calls 15799->15800 15801 b3b0c3 15800->15801 15802 b2d2b3 4 API calls 15801->15802 15804 b3b0d0 15802->15804 15803 b3b68d 15803->15783 15804->15803 15805 b2d2d4 5 API calls 15804->15805 15806 b3b663 15805->15806 15807 b2d2b3 4 API calls 15806->15807 15808 b3b670 15807->15808 15809 b2d2d4 5 API calls 15808->15809 15810 b3b680 15809->15810 15811 b2d2b3 4 API calls 15810->15811 15811->15803 15813 b49872 15812->15813 15814 b444a0 3 API calls 15813->15814 15815 b4a183 15814->15815 15816 b444a0 3 API calls 15815->15816 15817 b4a190 15816->15817 15818 b444a0 3 API calls 15817->15818 15819 b4a19d 15818->15819 15820 b2d2d4 5 API calls 15819->15820 15821 b4a1b0 15820->15821 15822 b2d2b3 4 API calls 15821->15822 15823 b4a1bd 15822->15823 15824 b2d25a 2 API calls 15823->15824 15825 b4a1fc 15824->15825 15826 b2d25a 2 API calls 15825->15826 15827 b4a203 15826->15827 15828 b2d25a 2 API calls 15827->15828 15829 b4a20a 15828->15829 15829->15829 15832 b4a38d 15829->15832 15896 b35573 15829->15896 15830 b4a522 15830->15438 15830->15442 15832->15830 16002 b2bd20 15832->16002 15835 b3d947 15834->15835 15836 b2d11f 2 API calls 15835->15836 15837 b3e274 15836->15837 15838 b2d11f 2 API calls 15837->15838 15839 b3e283 15838->15839 15840 b444cf 6 API calls 15839->15840 15841 b3e2cc 15840->15841 15842 b444cf 6 API calls 15841->15842 15843 b3e2d9 15842->15843 15844 b444cf 6 API calls 15843->15844 15845 b3e2e4 15844->15845 15846 b2d2d4 5 API calls 15845->15846 15847 b3e313 15846->15847 15848 b2d2b3 4 API calls 15847->15848 15849 b3e320 15848->15849 15850 b2d25a 2 API calls 15849->15850 15851 b3e371 15850->15851 15852 b2d25a 2 API calls 15851->15852 15853 b3e3b7 15852->15853 15854 b2d25a 2 API calls 15853->15854 15855 b3e3bf 15854->15855 15856 b2d25a 2 API calls 15855->15856 15857 b3e3c7 15856->15857 15857->15446 15859 b3e4fe 15858->15859 15860 b3d929 6 API calls 15859->15860 15861 b3f3b1 15860->15861 15862 b2d2d4 5 API calls 15861->15862 15863 b3f3c5 15862->15863 15864 b2d2b3 4 API calls 15863->15864 15872 b3f3d2 15864->15872 15865 b3f655 15866 b444cf 6 API calls 15865->15866 15867 b3f662 15866->15867 15868 b444cf 6 API calls 15867->15868 15869 b3f6d3 15868->15869 15870 b444cf 6 API calls 15869->15870 15871 b3f6e0 15870->15871 15873 b2d2d4 5 API calls 15871->15873 15872->15865 15872->15872 15874 b2d2d4 5 API calls 15872->15874 15875 b3f732 15873->15875 15876 b3f648 15874->15876 15877 b2d2b3 4 API calls 15875->15877 15878 b2d2b3 4 API calls 15876->15878 15879 b3f73f 15877->15879 15878->15865 15880 b2d2d4 5 API calls 15879->15880 15887 b3f792 15879->15887 15881 b3f76b 15880->15881 15882 b2d2b3 4 API calls 15881->15882 15883 b3f778 15882->15883 15884 b2d2d4 5 API calls 15883->15884 15885 b3f785 15884->15885 15886 b2d2b3 4 API calls 15885->15886 15886->15887 15888 b2d25a 2 API calls 15887->15888 15889 b3f7ec 15888->15889 15890 b2d25a 2 API calls 15889->15890 15891 b3f7f3 15890->15891 15892 b2d25a 2 API calls 15891->15892 15893 b3f7fb 15892->15893 15894 b2d25a 2 API calls 15893->15894 15895 b3f802 15894->15895 15895->15442 15897 b35587 15896->15897 15897->15897 15898 b2d2d4 5 API calls 15897->15898 15899 b3848d 15898->15899 15900 b2d2b3 4 API calls 15899->15900 15901 b3849a 15900->15901 15902 b2d11f 2 API calls 15901->15902 15984 b384a3 15901->15984 15904 b38516 15902->15904 15903 b38540 15906 b444a0 3 API calls 15903->15906 15904->15903 15905 b2bd20 3 API calls 15904->15905 15905->15903 15907 b3855a 15906->15907 15908 b2d25a 2 API calls 15907->15908 15909 b38587 15908->15909 15910 b2d2d4 5 API calls 15909->15910 15911 b38663 15910->15911 15912 b2d2b3 4 API calls 15911->15912 15913 b38670 15912->15913 15914 b38af7 15913->15914 15931 b3867d 15913->15931 15915 b2d25a 2 API calls 15914->15915 15916 b38b16 15915->15916 15917 b444cf 6 API calls 15916->15917 15918 b38b21 15917->15918 15919 b444cf 6 API calls 15918->15919 15920 b38b2b 15919->15920 15921 b2d2d4 5 API calls 15920->15921 15922 b38b6a 15921->15922 15923 b2d2b3 4 API calls 15922->15923 15924 b38b77 15923->15924 15925 b2d25a 2 API calls 15924->15925 15926 b38bae 15925->15926 15927 b2d25a 2 API calls 15926->15927 15928 b38bbf 15927->15928 15929 b3922d 15928->15929 15967 b38bca 15928->15967 15930 b2d2d4 5 API calls 15929->15930 15932 b39257 15930->15932 15931->15931 15934 b2d2d4 5 API calls 15931->15934 15933 b2d2b3 4 API calls 15932->15933 15963 b39264 15933->15963 15935 b38ac0 15934->15935 15936 b2d2b3 4 API calls 15935->15936 15941 b38acd 15936->15941 15937 b39778 15938 b444cf 6 API calls 15937->15938 15939 b39794 15938->15939 15940 b2d2d4 5 API calls 15939->15940 15943 b397a8 15940->15943 15942 b2d25a 2 API calls 15941->15942 15942->15984 15944 b2d2b3 4 API calls 15943->15944 15945 b397b5 15944->15945 15946 b2d2d4 5 API calls 15945->15946 15947 b397c7 15946->15947 15948 b2d2b3 4 API calls 15947->15948 15949 b397d4 15948->15949 15950 b2d2d4 5 API calls 15949->15950 15951 b397eb 15950->15951 15952 b2d2b3 4 API calls 15951->15952 15953 b397f8 15952->15953 15954 b3a1f5 15953->15954 15988 b39802 15953->15988 15955 b2d2d4 5 API calls 15954->15955 15956 b3a20d 15955->15956 15957 b2d2b3 4 API calls 15956->15957 15986 b3a21a 15957->15986 15958 b3a74d 15959 b2d2d4 5 API calls 15958->15959 15960 b3a761 15959->15960 15961 b2d2b3 4 API calls 15960->15961 15962 b3a76e 15961->15962 15965 b2d2d4 5 API calls 15962->15965 15963->15937 15963->15963 15964 b2d2d4 5 API calls 15963->15964 15966 b3976b 15964->15966 15968 b3a77e 15965->15968 15969 b2d2b3 4 API calls 15966->15969 15970 b2d2d4 5 API calls 15967->15970 15971 b2d2b3 4 API calls 15968->15971 15969->15937 15972 b391f6 15970->15972 15973 b3a78b 15971->15973 15974 b2d2b3 4 API calls 15972->15974 15976 b2d2d4 5 API calls 15973->15976 15975 b39203 15974->15975 15979 b2d2d4 5 API calls 15975->15979 15977 b3a79b 15976->15977 15978 b2d2b3 4 API calls 15977->15978 15982 b3a7a8 15978->15982 15980 b39213 15979->15980 15981 b2d2b3 4 API calls 15980->15981 15981->15984 15983 b2d25a 2 API calls 15982->15983 15983->15984 15984->15832 15985 b2d2d4 5 API calls 15985->15986 15986->15958 15986->15984 15986->15985 15987 b2d2b3 4 API calls 15986->15987 15987->15986 15988->15988 15989 b2d2d4 5 API calls 15988->15989 15990 b3a182 15989->15990 15991 b2d2b3 4 API calls 15990->15991 15992 b3a18f 15991->15992 15993 b2d2d4 5 API calls 15992->15993 15994 b3a19f 15993->15994 15995 b2d2b3 4 API calls 15994->15995 15996 b3a1ac 15995->15996 15997 b2d2d4 5 API calls 15996->15997 15998 b3a1bc 15997->15998 15999 b2d2b3 4 API calls 15998->15999 16000 b3a1c9 15999->16000 16001 b2d25a 2 API calls 16000->16001 16001->15984 16003 b2bd46 16002->16003 16004 b2d11f 2 API calls 16003->16004 16005 b2c3a0 16004->16005 16006 b2d11f 2 API calls 16005->16006 16007 b2c3ad 16006->16007 16008 b2c549 16007->16008 16012 b2c3c2 16007->16012 16009 b2d25a 2 API calls 16008->16009 16010 b2c5bd 16009->16010 16011 b2d25a 2 API calls 16010->16011 16020 b2c544 16011->16020 16013 b1c1d6 3 API calls 16012->16013 16014 b2c473 16013->16014 16015 b1ab69 3 API calls 16014->16015 16016 b2c47f 16015->16016 16017 b2d25a 2 API calls 16016->16017 16018 b2c53d 16017->16018 16019 b2d25a 2 API calls 16018->16019 16019->16020 16020->15830 16022 b455a5 16021->16022 16023 b2ef16 6 API calls 16022->16023 16024 b47543 16022->16024 16023->16024 16025 b2d2d4 5 API calls 16024->16025 16072 b4754d 16024->16072 16026 b47634 16025->16026 16027 b2d2b3 4 API calls 16026->16027 16028 b47642 16027->16028 16029 b2d11f 2 API calls 16028->16029 16030 b4764d 16029->16030 16031 b2d2d4 5 API calls 16030->16031 16032 b47674 16031->16032 16033 b2d2b3 4 API calls 16032->16033 16034 b47682 16033->16034 16035 b2d2d4 5 API calls 16034->16035 16036 b47742 16035->16036 16037 b2d2b3 4 API calls 16036->16037 16100 b47750 16037->16100 16038 b47f54 16039 b2d2d4 5 API calls 16038->16039 16040 b47fe4 16039->16040 16041 b2d2b3 4 API calls 16040->16041 16042 b47ff2 16041->16042 16043 b4808a 16042->16043 16046 b47ffc 16042->16046 16044 b2d2d4 5 API calls 16043->16044 16045 b4809a 16044->16045 16047 b2d2b3 4 API calls 16045->16047 16046->16046 16049 b2d25a 2 API calls 16046->16049 16048 b480a8 16047->16048 16051 b2d25a 2 API calls 16048->16051 16050 b4806b 16049->16050 16052 b597cf 7 API calls 16050->16052 16050->16072 16057 b480b6 16051->16057 16052->16072 16053 b48115 16054 b597b1 7 API calls 16053->16054 16055 b48132 16054->16055 16056 b2d11f 2 API calls 16055->16056 16059 b4813f 16056->16059 16057->16053 16058 b597cf 7 API calls 16057->16058 16058->16053 16060 b59793 7 API calls 16059->16060 16061 b481af 16060->16061 16062 b2d25a 2 API calls 16061->16062 16063 b481b9 16062->16063 16064 b481d0 16063->16064 16065 b482bd 16063->16065 16108 b59775 16064->16108 16066 b597a7 7 API calls 16065->16066 16067 b482fc 16066->16067 16068 b2d11f 2 API calls 16067->16068 16070 b48304 16068->16070 16147 b5979d 16070->16147 16072->15497 16100->16038 16100->16100 16103 b2d2d4 5 API calls 16100->16103 16105 b47f46 16103->16105 16107 b2d2b3 4 API calls 16105->16107 16107->16038 16109 b59710 7 API calls 16108->16109 16110 b5977f 16109->16110 16111 b59789 16110->16111 16112 b59710 7 API calls 16110->16112 16113 b59710 7 API calls 16111->16113 16112->16111 16114 b5978e 16113->16114 16115 b59793 16114->16115 16116 b59710 7 API calls 16114->16116 16117 b59710 7 API calls 16115->16117 16116->16115 16118 b59798 16117->16118 16119 b5979d 16118->16119 16120 b59710 7 API calls 16118->16120 16121 b59710 7 API calls 16119->16121 16120->16119 16122 b597a2 16121->16122 16123 b597a7 16122->16123 16124 b59710 7 API calls 16122->16124 16125 b59710 7 API calls 16123->16125 16124->16123 16126 b597ac 16125->16126 16127 b597b1 16126->16127 16128 b59710 7 API calls 16126->16128 16129 b59710 7 API calls 16127->16129 16128->16127 16130 b597bb 16129->16130 16131 b59710 7 API calls 16130->16131 16132 b597c5 16131->16132 16133 b59710 7 API calls 16132->16133 16134 b597ca 16133->16134 16135 b597cf 16134->16135 16136 b59710 7 API calls 16134->16136 16137 b59710 7 API calls 16135->16137 16136->16135 16138 b597d4 16137->16138 16139 b597d9 16138->16139 16140 b59710 7 API calls 16138->16140 16141 b59710 7 API calls 16139->16141 16140->16139 16142 b597de 16141->16142 16143 b597e3 16142->16143 16144 b59710 7 API calls 16142->16144 16145 b59710 7 API calls 16143->16145 16144->16143 16146 b597ed 16145->16146 16148 b59710 7 API calls 16147->16148 16149 b597a2 16148->16149 16150 b597a7 16149->16150 16151 b59710 7 API calls 16149->16151 16152 b59710 7 API calls 16150->16152 16151->16150 16153 b597ac 16152->16153 16154 b597b1 16153->16154 16155 b59710 7 API calls 16153->16155 16156 b59710 7 API calls 16154->16156 16155->16154 16157 b597bb 16156->16157 16158 b59710 7 API calls 16157->16158 16159 b597c5 16158->16159 16160 b59710 7 API calls 16159->16160 16161 b597ca 16160->16161 16162 b597cf 16161->16162 16163 b59710 7 API calls 16161->16163 16164 b59710 7 API calls 16162->16164 16163->16162 16165 b597d4 16164->16165 16166 b597d9 16165->16166 16167 b59710 7 API calls 16165->16167 16168 b59710 7 API calls 16166->16168 16167->16166 16169 b597de 16168->16169 16170 b597e3 16169->16170 16171 b59710 7 API calls 16169->16171 16172 b59710 7 API calls 16170->16172 16171->16170 16173 b597ed 16172->16173 16174 b43bc5 16175 b43af9 16174->16175 16175->16174 16176 b2d2d4 5 API calls 16175->16176 16183 b43fa0 16175->16183 16177 b43f7f 16176->16177 16178 b2d2b3 4 API calls 16177->16178 16179 b43f8c CreateMutexW 16178->16179 16180 b2d2d4 5 API calls 16179->16180 16181 b43f96 16180->16181 16182 b2d2b3 4 API calls 16181->16182 16182->16183 16184 b42000 16185 b42008 16184->16185 16185->16184 16186 b444a0 3 API calls 16185->16186 16187 b421f6 16186->16187 16188 b444a0 3 API calls 16187->16188 16189 b42209 16188->16189 16190 b426ab 16189->16190 16196 b4e50d 6 API calls 16189->16196 16197 b3f806 16189->16197 16191 b2d25a 2 API calls 16190->16191 16192 b426f3 16191->16192 16193 b2d25a 2 API calls 16192->16193 16194 b426fa 16193->16194 16196->16189 16198 b3f84e 16197->16198 16199 b2d11f 2 API calls 16198->16199 16200 b4056f 16199->16200 16201 b2d11f 2 API calls 16200->16201 16202 b40584 16201->16202 16203 b2d11f 2 API calls 16202->16203 16204 b40593 16203->16204 16205 b444a0 3 API calls 16204->16205 16206 b405a1 16205->16206 16207 b444cf 6 API calls 16206->16207 16208 b405af 16207->16208 16209 b444cf 6 API calls 16208->16209 16210 b405bd 16209->16210 16211 b444cf 6 API calls 16210->16211 16212 b405cb 16211->16212 16213 b2d2d4 5 API calls 16212->16213 16214 b405df 16213->16214 16215 b2d2b3 4 API calls 16214->16215 16216 b405ec 16215->16216 16235 b3b6a8 16216->16235 16218 b2d11f 2 API calls 16220 b4060c 16218->16220 16219 b407ea 16221 b2d25a 2 API calls 16219->16221 16220->16218 16220->16219 16222 b408a7 16221->16222 16223 b2d25a 2 API calls 16222->16223 16224 b408af 16223->16224 16225 b2d25a 2 API calls 16224->16225 16226 b408b7 16225->16226 16227 b2d25a 2 API calls 16226->16227 16228 b408bf 16227->16228 16228->16228 16229 b2d25a 2 API calls 16228->16229 16230 b409d0 16229->16230 16231 b2d25a 2 API calls 16230->16231 16232 b409d7 16231->16232 16233 b2d25a 2 API calls 16232->16233 16234 b40a1d 16233->16234 16234->16189 16236 b3b6d6 16235->16236 16237 b2d2d4 5 API calls 16236->16237 16238 b3ba63 16237->16238 16239 b2d2b3 4 API calls 16238->16239 16241 b3ba70 16239->16241 16240 b3c1cf 16240->16220 16241->16240 16242 b2d2d4 5 API calls 16241->16242 16243 b3bf63 16242->16243 16244 b2d2b3 4 API calls 16243->16244 16245 b3bf70 16244->16245 16246 b3c1b7 16245->16246 16250 b3bf7a 16245->16250 16247 b2d2d4 5 API calls 16246->16247 16248 b3c1af 16247->16248 16249 b2d2b3 4 API calls 16248->16249 16249->16240 16251 b2d2d4 5 API calls 16250->16251 16251->16248 16462 b43750 16463 b43759 16462->16463 16463->16462 16463->16463 16464 b2d2d4 5 API calls 16463->16464 16471 b43fa0 16463->16471 16465 b43f7f 16464->16465 16466 b2d2b3 4 API calls 16465->16466 16467 b43f8c CreateMutexW 16466->16467 16468 b2d2d4 5 API calls 16467->16468 16469 b43f96 16468->16469 16470 b2d2b3 4 API calls 16469->16470 16470->16471 16458 b49582 16459 b49574 16458->16459 16459->16458 16460 b49828 16459->16460 16461 b2bd20 3 API calls 16459->16461 16461->16460 16252 b335eb 16253 b335f0 16252->16253 16254 b2bd20 3 API calls 16253->16254 16255 b33601 16254->16255 16256 b444a0 3 API calls 16255->16256 16257 b33623 16256->16257 16258 b2d25a 2 API calls 16257->16258 16259 b33653 16258->16259 16260 b2d2d4 5 API calls 16259->16260 16261 b33758 16260->16261 16262 b2d2b3 4 API calls 16261->16262 16263 b33765 InternetConnectW 16262->16263 16264 b33be7 16263->16264 16280 b33772 16263->16280 16265 b2d25a 2 API calls 16264->16265 16266 b33c06 16265->16266 16267 b444cf 6 API calls 16266->16267 16268 b33c11 16267->16268 16269 b444cf 6 API calls 16268->16269 16270 b33c1b 16269->16270 16271 b2d2d4 5 API calls 16270->16271 16272 b33c57 16271->16272 16273 b2d2b3 4 API calls 16272->16273 16274 b33c64 HttpOpenRequestW 16273->16274 16275 b33c70 16274->16275 16276 b2d25a 2 API calls 16275->16276 16277 b33cad 16276->16277 16278 b2d25a 2 API calls 16277->16278 16279 b33cb4 16278->16279 16281 b34419 16279->16281 16322 b33cbf 16279->16322 16284 b2d2d4 5 API calls 16280->16284 16282 b2d2d4 5 API calls 16281->16282 16283 b3444d 16282->16283 16285 b2d2b3 4 API calls 16283->16285 16286 b33baf 16284->16286 16321 b3445a 16285->16321 16287 b2d2b3 4 API calls 16286->16287 16290 b33bbc 16287->16290 16288 b444cf 6 API calls 16289 b34aaf 16288->16289 16291 b2d2d4 5 API calls 16289->16291 16293 b2d25a 2 API calls 16290->16293 16292 b34ac3 16291->16292 16294 b2d2b3 4 API calls 16292->16294 16295 b33bdc 16293->16295 16296 b34ad0 16294->16296 16297 b2d2d4 5 API calls 16296->16297 16298 b34ae2 16297->16298 16299 b2d2b3 4 API calls 16298->16299 16300 b34aef 16299->16300 16301 b2d2d4 5 API calls 16300->16301 16302 b34b06 16301->16302 16303 b2d2b3 4 API calls 16302->16303 16304 b34b13 HttpSendRequestW 16303->16304 16305 b354c1 16304->16305 16335 b34b1d 16304->16335 16306 b2d2d4 5 API calls 16305->16306 16307 b354de 16306->16307 16308 b2d2b3 4 API calls 16307->16308 16309 b354eb 16308->16309 16310 b2d2d4 5 API calls 16309->16310 16311 b354f9 16310->16311 16312 b2d2b3 4 API calls 16311->16312 16313 b35506 InternetCloseHandle 16312->16313 16314 b2d2d4 5 API calls 16313->16314 16315 b35516 16314->16315 16316 b2d2b3 4 API calls 16315->16316 16317 b35523 16316->16317 16318 b2d2d4 5 API calls 16317->16318 16319 b35533 16318->16319 16320 b2d2b3 4 API calls 16319->16320 16347 b35491 16320->16347 16323 b2d2d4 5 API calls 16321->16323 16330 b34aa2 16321->16330 16322->16322 16324 b2d2d4 5 API calls 16322->16324 16325 b34a95 16323->16325 16326 b343e2 16324->16326 16328 b2d2b3 4 API calls 16325->16328 16327 b2d2b3 4 API calls 16326->16327 16329 b343ef 16327->16329 16328->16330 16332 b2d2d4 5 API calls 16329->16332 16330->16288 16331 b2d25a 2 API calls 16331->16295 16333 b343ff 16332->16333 16334 b2d2b3 4 API calls 16333->16334 16334->16295 16336 b2d2d4 5 API calls 16335->16336 16337 b3544a 16336->16337 16338 b2d2b3 4 API calls 16337->16338 16339 b35457 16338->16339 16340 b2d2d4 5 API calls 16339->16340 16341 b35467 16340->16341 16342 b2d2b3 4 API calls 16341->16342 16343 b35474 16342->16343 16344 b2d2d4 5 API calls 16343->16344 16345 b35484 16344->16345 16346 b2d2b3 4 API calls 16345->16346 16346->16347 16347->16331 16348 b495ec 16349 b495e4 16348->16349 16349->16348 16350 b49828 16349->16350 16351 b2bd20 3 API calls 16349->16351 16351->16350 16352 b32f99 16353 b32fcd 16352->16353 16354 b2d2d4 5 API calls 16353->16354 16355 b33571 16354->16355 16356 b2d2b3 4 API calls 16355->16356 16357 b3357e InternetOpenW 16356->16357 16358 b33587 16357->16358 16426 b43739 16427 b4378c 16426->16427 16428 b2d2d4 5 API calls 16427->16428 16435 b43fa0 16427->16435 16429 b43f7f 16428->16429 16430 b2d2b3 4 API calls 16429->16430 16431 b43f8c CreateMutexW 16430->16431 16432 b2d2d4 5 API calls 16431->16432 16433 b43f96 16432->16433 16434 b2d2b3 4 API calls 16433->16434 16434->16435 16359 b233bc 16360 b233b1 16359->16360 16360->16359 16361 b2d11f 2 API calls 16360->16361 16362 b23412 16361->16362 16363 b2d11f 2 API calls 16362->16363 16364 b23429 16363->16364 16365 b2d11f 2 API calls 16364->16365 16366 b23440 16365->16366 16367 b2d11f 2 API calls 16366->16367 16368 b2345a 16367->16368 16369 b444a0 3 API calls 16368->16369 16370 b2347f 16369->16370 16371 b2d2d4 5 API calls 16370->16371 16372 b23495 16371->16372 16373 b2d2b3 4 API calls 16372->16373 16374 b234a2 16373->16374 16375 b2d25a 2 API calls 16374->16375 16376 b234c2 16375->16376 16377 b444a0 3 API calls 16376->16377 16378 b234cd 16377->16378 16379 b2d11f 2 API calls 16378->16379 16384 b234dd 16379->16384 16380 b2d11f 2 API calls 16380->16384 16381 b236ed 16382 b2d25a 2 API calls 16381->16382 16383 b2374c 16382->16383 16385 b2d11f 2 API calls 16383->16385 16384->16380 16384->16381 16384->16384 16386 b2377e 16385->16386 16387 b40a2d 11 API calls 16386->16387 16388 b23798 16387->16388 16389 b416c5 6 API calls 16388->16389 16390 b237d1 16389->16390 16391 b416c5 6 API calls 16390->16391 16392 b23812 16391->16392 16393 b416c5 6 API calls 16392->16393 16394 b23856 16393->16394 16395 b41aa6 10 API calls 16394->16395 16397 b23896 16395->16397 16396 b24b24 16397->16396 16398 b2d25a 2 API calls 16397->16398 16399 b2392d 16398->16399 16400 b444a0 3 API calls 16399->16400 16401 b23938 16400->16401 16402 b2d2d4 5 API calls 16401->16402 16403 b2394c 16402->16403 16404 b2d2b3 4 API calls 16403->16404 16405 b23959 16404->16405 16406 b2d25a 2 API calls 16405->16406 16407 b23985 16406->16407 16408 b2b343 6 API calls 16407->16408 16409 b2399a 16408->16409 16410 b24b03 16409->16410 16424 b239a7 16409->16424 16411 b2d25a 2 API calls 16410->16411 16412 b24b0a 16411->16412 16413 b2d25a 2 API calls 16412->16413 16414 b24b12 16413->16414 16415 b2d25a 2 API calls 16414->16415 16416 b24b1d 16415->16416 16417 b2d25a 2 API calls 16416->16417 16417->16396 16418 b4e50d 6 API calls 16418->16424 16419 b444a0 GetPEB RtlAllocateHeap HeapFree 16419->16424 16420 b2d2d4 5 API calls 16420->16424 16421 b2d2b3 4 API calls 16421->16424 16422 b2b343 6 API calls 16422->16424 16423 b583ad 10 API calls 16423->16424 16424->16418 16424->16419 16424->16420 16424->16421 16424->16422 16424->16423 16425 b2d25a GetPEB HeapFree 16424->16425 16425->16424
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: "$#$$x$%hs!%p: $%s\%s.mui$'$'$($)$,$,$,$.$0$1$1$3$7$7$;$;$;$@$AppID$B$C+$E$F$K$N$O$PartA_PrivTags$R$System$T$T$T$U$W$WIv$Y$Y$Y$YMWQ$Z$^k7y$a$a$currentContextMessage$d$de-DE$de-DE$et-EE$failureId$io error$mni-IN$no message$no protocol option$permission denied$timed_out$w$yi-001$1-"$_YV$iC
                              • API String ID: 0-1449502329
                              • Opcode ID: d089ccd52dc50250fdc0e299e7bf78bd8ca311da560b0ea4e6a281a76e81c449
                              • Instruction ID: 812408c96b30e892c423de0d9050f1f24131852f8405ddc276a63d8b3ca3a57e
                              • Opcode Fuzzy Hash: d089ccd52dc50250fdc0e299e7bf78bd8ca311da560b0ea4e6a281a76e81c449
                              • Instruction Fuzzy Hash: 5F33AE71E042A88FDB26CF68D8413EDBBF1AF59304F1486EAD48CAB342D7745A858F54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00B2D2B3: GetProcAddress.KERNELBASE(00000000,00000000), ref: 00B2D2C0
                              • CreateToolhelp32Snapshot.KERNEL32(?,?,00000013,?,?,00000013,?,00000005,00000005,00000005,?,0000000A,0000000C,00000013,-000017FD), ref: 00B26AAC
                              • Process32FirstW.KERNEL32(00000000,?,?,00000005,00000005,00000005,?,0000000A,0000000C,00000013,-000017FD), ref: 00B26AEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCreateFirstProcProcess32SnapshotToolhelp32
                              • String ID: #$#$,$,a$0$3$5]$D$DOp$F$F$HKEY_DYN_DATA$HKEY_LOCAL_MACHINE$LogHr$NtQueryWnfStateData$RegDeleteKeyExW$X$X$Z$a$address_not_available$ca-ES$currentContextId$failureCount$fileName$ibb-NG$j$ka-GE$ky-KG$mq$network_down$no stream resources$onecoreuap\base\appmodel\search\common\pkmutild\cregistry.cxx$operation would block$r$sl-SI$sr-SP-Cyrl$text file busy$too many files open in system$too_many_files_open$w0$wrong protocol type$Se
                              • API String ID: 1169705608-3400702908
                              • Opcode ID: 6ce84cad4d4f4658150370448c1e102685b8fbd05ff485808b8a86530a610e95
                              • Instruction ID: 92c7b87f3910374781d5f14a56143faff6c8d77beb282dc068cf679c8ee7db9d
                              • Opcode Fuzzy Hash: 6ce84cad4d4f4658150370448c1e102685b8fbd05ff485808b8a86530a610e95
                              • Instruction Fuzzy Hash: BE33C631E042A88FDB15CFA8A8543EDBBF1AF59300F1486EAD8D8E7352D6744A85CF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00B2D25A: HeapFree.KERNEL32(00000000,00B2C92B,?), ref: 00B2D2AB
                              • InternetConnectW.WININET(?,?,?,?,?,?,?,?), ref: 00B33765
                                • Part of subcall function 00B2D2B3: GetProcAddress.KERNELBASE(00000000,00000000), ref: 00B2D2C0
                              • HttpOpenRequestW.WININET(?,00000000,00000000,?,?,?,00400000), ref: 00B33C64
                              • HttpSendRequestW.WININET(?,00000000,00000000,?,00000000), ref: 00B34B13
                              • InternetCloseHandle.WININET(?), ref: 00B35506
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: HttpInternetRequest$AddressCloseConnectFreeHandleHeapOpenProcSend
                              • String ID: $$$$$)$.Bu{failureId$0$1`$4$8<wJ$8q1"$;$HostProcessExecution$L$N$R$W$X$\h$^$bin-NG$chr-Cher-US$ext-ms-win-advapi32-eventlog-l1-1-0$fil-PH$fileName$invalid seek$invalid string position$ks-Arab$l"$message$mk-MK$network reset$originatingContextMessage$originatingContextName$q$sr-BA-Cyrl$threadId$zh-Hant
                              • API String ID: 563973479-2634115502
                              • Opcode ID: ac08804aa6ccbf24e4a85a17240f57eb235e7ec287485aa60c3455dccb42176e
                              • Instruction ID: 67294e9cd00d42c4533aca22b9e3b8688a79546d58135e756001c528a7265fca
                              • Opcode Fuzzy Hash: ac08804aa6ccbf24e4a85a17240f57eb235e7ec287485aa60c3455dccb42176e
                              • Instruction Fuzzy Hash: 5413C171A042A88FDB15CFA8D8513EDBBF1AF59300F1886E9D498B7342DB745A86CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: "$$$($6$AppID$L$Local\SM0:%d:%d:%hs$ModuleCollection$NtUpdateWnfStateData$PartA_PrivTags$QB$S$TelemetryAssert$argument list too long$bg-BG$et-EE$executable format error$ext-ms-win-advapi32-eventlog-l1-1-1$ext-ms-win-imm-l1-1-0$fi-FI$generic$inappropriate io control operation$is a directory$k$module$nz$too many files open in system$ur-PK$zQ$4$B
                              • API String ID: 0-2165300778
                              • Opcode ID: 815db5a1f4687cb57d36203d5aa066988587b3ecdfe3c96534dbeca68e6294af
                              • Instruction ID: 6a7b193a65ba0998a2f56559a4a8e31d0bed1322c2289dbbf24d9007ab5857cc
                              • Opcode Fuzzy Hash: 815db5a1f4687cb57d36203d5aa066988587b3ecdfe3c96534dbeca68e6294af
                              • Instruction Fuzzy Hash: 32E2D731E042A85EDB55CFA9A4503EC7FF1AF19300F6885F9D898E7342EA344A86DF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetVolumeInformationW.KERNELBASE(00000000,?,?,00000040,?,?,?,?,?,00000009,?,00000015,0000001A,00000018,00000015,?), ref: 00B3D2A8
                                • Part of subcall function 00B2D2B3: GetProcAddress.KERNELBASE(00000000,00000000), ref: 00B2D2C0
                                • Part of subcall function 00B2D25A: HeapFree.KERNEL32(00000000,00B2C92B,?), ref: 00B2D2AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHeapInformationProcVolume
                              • String ID: #&NDB$&$-$0$3$;$G$HKEY_CLASSES_ROOT$RtlDllShutdownInProgress$RtlNtStatusToDosErrorNoTeb$V$]$address_not_available$c$e#6%$failureId$id-ID$imageName$km-KH$not supported$originatingContextId$pt-BR$sl-SI$th-TH
                              • API String ID: 1952060866-6681821
                              • Opcode ID: cb0eabaef43b02cc506c05136138189e704044b9164f9f9ee2ce5a28cee94670
                              • Instruction ID: fd9c9a4a0c716ceb0635fc12228490eb7abd3da45e52506a72d3cff66425f01e
                              • Opcode Fuzzy Hash: cb0eabaef43b02cc506c05136138189e704044b9164f9f9ee2ce5a28cee94670
                              • Instruction Fuzzy Hash: E9C2C031A042998EDB15CFA9D8553EDBFF1AF59300F2885EAD889FB381D6344A46CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1904 b20157-b20176 1905 b20178-b20180 1904->1905 1905->1905 1906 b20182-b2019b 1905->1906 1907 b201a2-b201aa 1906->1907 1907->1907 1908 b201ac-b20239 1907->1908 1909 b2023a-b20240 1908->1909 1910 b20242-b2024d 1909->1910 1911 b20257-b2025d 1909->1911 1910->1909 1913 b2024f-b20255 1910->1913 1912 b20263-b20276 call b1cc59 1911->1912 1916 b20278-b20285 1912->1916 1913->1912 1916->1916 1917 b20287 1916->1917 1918 b20289-b202b7 1917->1918 1919 b202b8-b202c1 1918->1919 1920 b202d2 1919->1920 1921 b202c3-b202ce 1919->1921 1923 b202d8-b202fd 1920->1923 1921->1919 1922 b202d0 1921->1922 1922->1923 1923->1918 1924 b202ff-b20308 1923->1924 1925 b2030a-b20358 1924->1925 1925->1925 1926 b2035a-b20383 1925->1926 1927 b20385-b20392 1926->1927 1927->1927 1928 b20394 1927->1928 1929 b20396-b203d1 1928->1929 1929->1929 1930 b203d3-b203dd 1929->1930 1931 b203df-b203f1 1930->1931 1932 b203f2-b203fd 1931->1932 1933 b20408-b2040d call b1cc59 1932->1933 1934 b203ff-b20404 1932->1934 1937 b20413-b20474 call b1ca32 1933->1937 1934->1932 1935 b20406 1934->1935 1935->1937 1937->1931 1941 b2047a-b204f3 1937->1941 1942 b204f7-b20504 1941->1942 1942->1942 1943 b20506 1942->1943 1944 b20508-b20543 1943->1944 1944->1944 1945 b20545-b2054f 1944->1945 1946 b20551-b205ad 1945->1946 1946->1946 1947 b205af-b205d7 1946->1947 1948 b205d8-b205e5 1947->1948 1948->1948 1949 b205e7-b205ea 1948->1949 1950 b205ec-b2061e 1949->1950 1951 b20625-b2062e 1950->1951 1952 b20630-b2063b 1951->1952 1953 b2063f 1951->1953 1952->1951 1954 b2063d 1952->1954 1955 b20645-b2065c 1953->1955 1954->1955 1955->1950 1956 b2065e-b20665 1955->1956 1957 b20667-b206c5 1956->1957 1957->1957 1958 b206c7-b206d7 1957->1958 1959 b206d9-b206e2 1958->1959 1960 b206f3 1959->1960 1961 b206e4-b206ef 1959->1961 1963 b206f9-b2071a 1960->1963 1961->1959 1962 b206f1 1961->1962 1962->1963 1964 b20721-b20729 1963->1964 1964->1964 1965 b2072b-b20798 1964->1965 1966 b2079b-b207a8 1965->1966 1966->1966 1967 b207aa 1966->1967 1968 b207ac-b207f1 1967->1968 1968->1968 1969 b207f3-b207fc 1968->1969 1970 b207fe-b2084c 1969->1970 1970->1970 1971 b2084e-b20853 1970->1971 1972 b20854-b2085d 1971->1972 1973 b20874 1972->1973 1974 b2085f-b20870 1972->1974 1976 b2087a-b208a5 1973->1976 1974->1972 1975 b20872 1974->1975 1975->1976 1977 b208a7-b208b4 1976->1977 1977->1977 1978 b208b6-b208ba 1977->1978 1979 b208bb-b208f1 1978->1979 1979->1979 1980 b208f3-b208f9 1979->1980 1981 b208fb-b20946 1980->1981 1981->1981 1982 b20948-b20952 1981->1982 1983 b20954-b2095d 1982->1983 1984 b20969-b2096c 1983->1984 1985 b2095f-b20962 1983->1985 1987 b20971-b209c8 call b2d2d4 call b2d2b3 call b2d2d4 call b2d2b3 1984->1987 1985->1983 1986 b20964-b20967 1985->1986 1986->1987 1998 b20a05-b20a08 1987->1998 1999 b209ca-b209ff call b2d2d4 call b2d2b3 GetTokenInformation 1987->1999 2001 b20c33-b20c3d 1998->2001 2002 b20a0e-b20a5e 1998->2002 1999->1998 2004 b20a65-b20a72 2002->2004 2004->2004 2006 b20a74 2004->2006 2007 b20a76-b20aac 2006->2007 2009 b20ab1-b20aba 2007->2009 2010 b20ac5-b20aca call b1cc59 2009->2010 2011 b20abc-b20ac1 2009->2011 2014 b20ad0-b20ae7 2010->2014 2011->2009 2012 b20ac3 2011->2012 2012->2014 2014->2007 2016 b20ae9-b20af7 2014->2016 2017 b20afc-b20b4a 2016->2017 2017->2017 2018 b20b4c-b20b6e 2017->2018 2019 b20b72-b20b7f 2018->2019 2019->2019 2020 b20b81 2019->2020 2021 b20b83-b20bbe 2020->2021 2021->2021 2022 b20bc0-b20bc6 2021->2022 2023 b20bc8-b20c15 2022->2023 2023->2023 2024 b20c17-b20c31 call b2d2d4 call b2d2b3 FindCloseChangeNotification 2023->2024 2024->2001
                              APIs
                              • GetTokenInformation.KERNELBASE(?,00000014,F9D557B4,00000004,?), ref: 00B209F1
                              • FindCloseChangeNotification.KERNELBASE(?,?), ref: 00B20C31
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: ChangeCloseFindInformationNotificationToken
                              • String ID: !$&$($F$Interface$O$PartA_PrivTags$PartA_PrivTags$Q$TypeLib$Windows Search Service$count$function$km-KH$message$no buffer space$not a stream$s$1_$O
                              • API String ID: 584730905-3306895544
                              • Opcode ID: 35d3cdddc9846d17915281404e0c825cceccd1f151da0e9c8697bbb08d7da195
                              • Instruction ID: 85afb85ca29bda82f5e99fd71fdd1508cecb4ca54ef6259365b4896a4affad94
                              • Opcode Fuzzy Hash: 35d3cdddc9846d17915281404e0c825cceccd1f151da0e9c8697bbb08d7da195
                              • Instruction Fuzzy Hash: DE62C531B052A88EDB16DFADA4903ED7FF1AF1A300F5845FAD8C9E7342D2644A45CB21
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2029 b43750-b43757 2030 b4377e-b4378a 2029->2030 2031 b43759-b4375f 2029->2031 2032 b43792 2030->2032 2033 b4378c 2030->2033 2031->2029 2034 b43761-b43767 2031->2034 2036 b43798-b437e4 2032->2036 2033->2032 2034->2033 2035 b43769-b4377c call b4350e 2034->2035 2035->2036 2037 b437e7-b437f5 2036->2037 2037->2037 2039 b437f7-b43809 2037->2039 2041 b4380c-b4384e 2039->2041 2041->2041 2042 b43850-b43855 2041->2042 2043 b43857-b438bc 2042->2043 2043->2043 2044 b438be-b438eb 2043->2044 2045 b438ec-b438fa 2044->2045 2045->2045 2046 b438fc 2045->2046 2047 b438fe-b4394b 2046->2047 2047->2047 2048 b4394d-b43952 2047->2048 2049 b43954-b439aa 2048->2049 2049->2049 2050 b439ac-b439d4 2049->2050 2051 b439db-b439e3 2050->2051 2051->2051 2052 b439e5-b43a90 2051->2052 2053 b43a97-b43aa5 2052->2053 2053->2053 2054 b43aa7-b43aa9 2053->2054 2055 b43aab-b43aea 2054->2055 2055->2055 2056 b43aec-b43af6 2055->2056 2057 b43af9-b43c01 2056->2057 2061 b43c03-b43c0c 2057->2061 2062 b43c1d-b43c2e call b4350e 2057->2062 2063 b43c17 2061->2063 2064 b43c0e-b43c13 2061->2064 2068 b43c2f-b43c38 2062->2068 2063->2062 2064->2061 2066 b43c15 2064->2066 2069 b43c5f-b43c67 2066->2069 2070 b43c43-b43c48 call b4350e 2068->2070 2071 b43c3a-b43c3f 2068->2071 2072 b43c87-b43cd4 call b4350e call b43644 2069->2072 2073 b43c69-b43c6f 2069->2073 2079 b43c4e-b43c5a call b43644 2070->2079 2071->2068 2074 b43c41 2071->2074 2072->2057 2089 b43cda-b43d35 2072->2089 2075 b43c71-b43c78 2073->2075 2076 b43c7c-b43c81 call b43644 2073->2076 2074->2079 2075->2073 2080 b43c7a 2075->2080 2076->2072 2079->2069 2080->2072 2090 b43d44-b43d46 2089->2090 2091 b43d37-b43d3b 2090->2091 2092 b43d48-b43d59 2090->2092 2093 b44000-b44003 2091->2093 2094 b43d41-b43d42 2091->2094 2095 b43d5b-b43d68 2092->2095 2097 b4400e-b44013 call b20f33 2093->2097 2094->2090 2095->2095 2096 b43d6a-b43d6c 2095->2096 2098 b43d6f-b43db8 2096->2098 2098->2098 2100 b43dba-b43dc7 2098->2100 2101 b43dcc-b43e22 2100->2101 2101->2101 2102 b43e24-b43e42 2101->2102 2103 b43e44-b43e52 2102->2103 2103->2103 2104 b43e54 2103->2104 2105 b43e56-b43e95 2104->2105 2105->2105 2106 b43e97-b43e9c 2105->2106 2107 b43e9e-b43ef1 2106->2107 2107->2107 2108 b43ef3-b43f18 2107->2108 2109 b43f1f-b43f27 2108->2109 2109->2109 2110 b43f29-b43f3b 2109->2110 2111 b43f3c-b43f44 2110->2111 2111->2111 2112 b43f46-b43f53 2111->2112 2113 b43f5a-b43f62 2112->2113 2113->2113 2114 b43f64-b43fa7 call b2d2d4 call b2d2b3 CreateMutexW call b2d2d4 call b2d2b3 2113->2114 2114->2097 2124 b43fa9-b4401d 2114->2124
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: #$*$+$-$/$?$@$P$PPTP00W$X$es-ES_tradnl$message_size$message_size$module$sH(s$too many files open in system$z0[$zh-Hant
                              • API String ID: 0-3155290421
                              • Opcode ID: 33cd1e4d217db16966d1e25dd21bed1b9f7cd4b281577d790171ed6c9f62d0fb
                              • Instruction ID: 94b75ed3586ac3a9550a9917e6a7de9fc325cb85dc2dea8be133507314b48e5e
                              • Opcode Fuzzy Hash: 33cd1e4d217db16966d1e25dd21bed1b9f7cd4b281577d790171ed6c9f62d0fb
                              • Instruction Fuzzy Hash: 4522BF71D042988FDB45CFA894603ECBFF1AF5A310F2942EAD998B7342D6744A86DF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2126 b43739-b437e4 2130 b437e7-b437f5 2126->2130 2130->2130 2131 b437f7-b43809 2130->2131 2132 b4380c-b4384e 2131->2132 2132->2132 2133 b43850-b43855 2132->2133 2134 b43857-b438bc 2133->2134 2134->2134 2135 b438be-b438eb 2134->2135 2136 b438ec-b438fa 2135->2136 2136->2136 2137 b438fc 2136->2137 2138 b438fe-b4394b 2137->2138 2138->2138 2139 b4394d-b43952 2138->2139 2140 b43954-b439aa 2139->2140 2140->2140 2141 b439ac-b439d4 2140->2141 2142 b439db-b439e3 2141->2142 2142->2142 2143 b439e5-b43a90 2142->2143 2144 b43a97-b43aa5 2143->2144 2144->2144 2145 b43aa7-b43aa9 2144->2145 2146 b43aab-b43aea 2145->2146 2146->2146 2147 b43aec-b43af6 2146->2147 2148 b43af9-b43c01 2147->2148 2152 b43c03-b43c0c 2148->2152 2153 b43c1d-b43c2e call b4350e 2148->2153 2154 b43c17 2152->2154 2155 b43c0e-b43c13 2152->2155 2159 b43c2f-b43c38 2153->2159 2154->2153 2155->2152 2157 b43c15 2155->2157 2160 b43c5f-b43c67 2157->2160 2161 b43c43-b43c48 call b4350e 2159->2161 2162 b43c3a-b43c3f 2159->2162 2163 b43c87-b43cd4 call b4350e call b43644 2160->2163 2164 b43c69-b43c6f 2160->2164 2170 b43c4e-b43c5a call b43644 2161->2170 2162->2159 2165 b43c41 2162->2165 2163->2148 2180 b43cda-b43d35 2163->2180 2166 b43c71-b43c78 2164->2166 2167 b43c7c-b43c81 call b43644 2164->2167 2165->2170 2166->2164 2171 b43c7a 2166->2171 2167->2163 2170->2160 2171->2163 2181 b43d44-b43d46 2180->2181 2182 b43d37-b43d3b 2181->2182 2183 b43d48-b43d59 2181->2183 2184 b44000-b44003 2182->2184 2185 b43d41-b43d42 2182->2185 2186 b43d5b-b43d68 2183->2186 2188 b4400e-b44013 call b20f33 2184->2188 2185->2181 2186->2186 2187 b43d6a-b43d6c 2186->2187 2189 b43d6f-b43db8 2187->2189 2189->2189 2191 b43dba-b43dc7 2189->2191 2192 b43dcc-b43e22 2191->2192 2192->2192 2193 b43e24-b43e42 2192->2193 2194 b43e44-b43e52 2193->2194 2194->2194 2195 b43e54 2194->2195 2196 b43e56-b43e95 2195->2196 2196->2196 2197 b43e97-b43e9c 2196->2197 2198 b43e9e-b43ef1 2197->2198 2198->2198 2199 b43ef3-b43f18 2198->2199 2200 b43f1f-b43f27 2199->2200 2200->2200 2201 b43f29-b43f3b 2200->2201 2202 b43f3c-b43f44 2201->2202 2202->2202 2203 b43f46-b43f53 2202->2203 2204 b43f5a-b43f62 2203->2204 2204->2204 2205 b43f64-b43fa7 call b2d2d4 call b2d2b3 CreateMutexW call b2d2d4 call b2d2b3 2204->2205 2205->2188 2215 b43fa9-b4401d 2205->2215
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: *$+$/$?$@$P$PPTP00W$es-ES_tradnl$message_size$message_size$module$sH(s$se-NO$too many files open in system$z0[$zh-Hant
                              • API String ID: 0-22870121
                              • Opcode ID: fdc49d95bbabcb7c607fcf5abafcd91c76c66d3c57ed59fe257cc0bb9680e030
                              • Instruction ID: 41ebd2b458305b33e448290c764ef5b0ffde0277f3aaa8029ca178cdc31fdcd6
                              • Opcode Fuzzy Hash: fdc49d95bbabcb7c607fcf5abafcd91c76c66d3c57ed59fe257cc0bb9680e030
                              • Instruction Fuzzy Hash: C922C071E042A88FDF41CFA994503ECBFF1AF5A300F2941E9D998A7342D6744A86DF60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2217 b40a2d-b40e75 2218 b40e79-b40e86 2217->2218 2218->2218 2219 b40e88 2218->2219 2220 b40e8a-b40ec5 2219->2220 2220->2220 2221 b40ec7-b40ed7 2220->2221 2222 b40eda-b40f2e 2221->2222 2222->2222 2223 b40f30-b40fc4 2222->2223 2224 b40fcb-b40fd8 2223->2224 2224->2224 2225 b40fda 2224->2225 2226 b40fdc-b41016 2225->2226 2226->2226 2227 b41018-b4101a 2226->2227 2228 b4101c-b4106a 2227->2228 2228->2228 2229 b4106c-b4108e 2228->2229 2230 b41098-b410a3 2229->2230 2230->2230 2231 b410a5-b410e2 2230->2231 2232 b410e9-b410ef 2231->2232 2233 b410f1-b410f7 2232->2233 2234 b410f9-b410fe 2232->2234 2233->2232 2233->2234 2235 b41105-b4111a 2234->2235 2236 b41100 call b3a7fb 2234->2236 2238 b4111d-b4112a 2235->2238 2236->2235 2238->2238 2239 b4112c-b41135 call b3a995 2238->2239 2242 b41137-b41172 2239->2242 2242->2242 2243 b41174-b4118b call b3a995 2242->2243 2246 b4118d-b411db 2243->2246 2246->2246 2247 b411dd-b411f2 2246->2247 2248 b411f4-b411fd 2247->2248 2249 b41218-b41220 2247->2249 2250 b41212 2248->2250 2251 b411ff-b41204 2248->2251 2252 b41223-b4124f 2249->2252 2250->2249 2251->2248 2253 b41206-b41210 2251->2253 2254 b41251-b4125e 2252->2254 2253->2252 2254->2254 2255 b41260 2254->2255 2256 b41262-b4129d 2255->2256 2256->2256 2257 b4129f-b412a8 2256->2257 2258 b412ab-b41307 2257->2258 2258->2258 2259 b41309-b4133f 2258->2259 2260 b41341-b4134e 2259->2260 2260->2260 2261 b41350 2260->2261 2262 b41352-b41394 2261->2262 2262->2262 2263 b41396-b413a1 2262->2263 2264 b413a3-b413f5 2263->2264 2264->2264 2265 b413f7-b413fb 2264->2265 2266 b41402-b41408 2265->2266 2267 b41414-b41420 call b3a7fb 2266->2267 2268 b4140a-b41410 2266->2268 2271 b41423-b41560 2267->2271 2268->2266 2269 b41412 2268->2269 2269->2271 2273 b41561-b4156f 2271->2273 2273->2273 2274 b41571-b415a3 call b20c3e call b444cf * 2 call b2d11f 2273->2274 2282 b415a8-b416c4 call b2d2d4 call b2d2b3 call b44b31 call b44653 call b443f8 call b44add call b2b343 call b44b31 call b443f8 call b44b31 call b443f8 call b2d25a * 2 call b443f8 call b2d25a * 2 2274->2282
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $Bf$*$,$/$@:M8$CLSID$N$N$S$VR_!$]$b$bfA($c+$currentContextName$fileName$interrupted$no lock available$q$ti-ET$u%$ydV2$^<
                              • API String ID: 0-3569637293
                              • Opcode ID: f57a081499bab107e651b844df45580ef2e0c83b90f674279ddf28c68df2894f
                              • Instruction ID: c223b6c057a4ec9f7ef45ae01f984307d0b4ed7bcbf503c5eccbb1a949b07a75
                              • Opcode Fuzzy Hash: f57a081499bab107e651b844df45580ef2e0c83b90f674279ddf28c68df2894f
                              • Instruction Fuzzy Hash: 0162CA71E053A88FCB22CFA898816DDBBB1AF19300F5446E9D498AB242D7744BC5DF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID: ,$,$.$0$1$7$;$@$E$N$PartA_PrivTags$R$T$W$Y$Y$d$de-DE$et-EE$permission denied
                              • API String ID: 1279760036-3904138336
                              • Opcode ID: af43248484add740d844d59803edcf8b9dd3645ba507944a59ba167d472bd59b
                              • Instruction ID: 7756c81fa37e5f0f1a50740a4b3a9b8acbeab65f19b07aa787a93e8b17fdea06
                              • Opcode Fuzzy Hash: af43248484add740d844d59803edcf8b9dd3645ba507944a59ba167d472bd59b
                              • Instruction Fuzzy Hash: 04528971E002688BDB29DF68D8557EDBBF6EF44304F0481E9E44DAB241DB349A82CF44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2645 b42000-b42006 2646 b42013 2645->2646 2647 b42008-b4200f 2645->2647 2649 b4201a-b4205a 2646->2649 2647->2645 2648 b42011 2647->2648 2648->2649 2650 b4205b-b42068 2649->2650 2650->2650 2651 b4206a-b4206d 2650->2651 2652 b4206f-b4209e 2651->2652 2653 b4209f-b420b1 2652->2653 2655 b420b3-b420ef call b3a9ae 2653->2655 2655->2652 2659 b420f5-b420ff 2655->2659 2660 b42101-b4214f 2659->2660 2660->2660 2661 b42151-b421b6 2660->2661 2662 b421b8-b421c3 2661->2662 2662->2662 2663 b421c5-b421dd 2662->2663 2664 b421de-b421e6 2663->2664 2664->2664 2665 b421e8-b42213 call b444a0 * 2 2664->2665 2670 b42219-b42296 2665->2670 2671 b426ab-b42701 call b44add call b443f8 call b44add call b443f8 call b2d25a * 2 2665->2671 2672 b422a0-b422ae 2670->2672 2674 b422b0-b422bb 2672->2674 2674->2674 2676 b422bd-b422d1 2674->2676 2678 b422d2-b422dd 2676->2678 2678->2678 2680 b422df-b423dc 2678->2680 2682 b423e3-b423f1 2680->2682 2682->2682 2684 b423f3 2682->2684 2686 b423f5-b42424 2684->2686 2689 b42425-b42435 2686->2689 2693 b42437-b4246d 2689->2693 2693->2686 2696 b4246f-b42479 2693->2696 2697 b4247b-b424dc 2696->2697 2697->2697 2698 b424de-b42508 2697->2698 2699 b4250c-b42517 2698->2699 2699->2699 2700 b42519-b42550 call b443f8 2699->2700 2704 b42552-b42561 2700->2704 2705 b425b3-b425c7 call b44add call b44713 2700->2705 2707 b4256b-b42576 2704->2707 2712 b425cc-b425ec call b48718 2705->2712 2707->2707 2709 b42578-b4258c call b3f806 2707->2709 2715 b4259b-b4259d 2709->2715 2718 b425f1-b425f9 2712->2718 2716 b4258e-b42592 2715->2716 2717 b4259f 2715->2717 2722 b42598-b42599 2716->2722 2723 b4265b-b42665 2716->2723 2719 b425a4-b425ae call b3a7fb 2717->2719 2720 b42648-b42656 call b4e50d 2718->2720 2721 b425fb-b42612 2718->2721 2719->2705 2720->2672 2726 b42614-b4261f 2721->2726 2722->2715 2723->2719 2726->2726 2728 b42621-b42633 call b4508d 2726->2728 2728->2720 2731 b42635-b42646 call b44ce7 2728->2731 2731->2671 2731->2720
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: !$$$&$&$'$1$6$;$<$B$D$HKEY_CURRENT_USER$PG!$Software\Microsoft\Windows Search\Tracing$address_not_available$fi-FI$fil-PH$jq=&$'a$+$
                              • API String ID: 0-1434026967
                              • Opcode ID: d4de2a5ab8063ebcc2eeb54b8945766b4aea2c2d7404df9175d354dc726977e0
                              • Instruction ID: 6eeab67d2e96905fb54792eddadbcfda57ddedc44ed9fdb38ed91bc1ca6cf9ff
                              • Opcode Fuzzy Hash: d4de2a5ab8063ebcc2eeb54b8945766b4aea2c2d7404df9175d354dc726977e0
                              • Instruction Fuzzy Hash: 02020F71D002688FEB25CF68D8857DDBBF1AF55300F2082E9E458BB252DB345A85EF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2779 b43bc5-b43bd0 2780 b43bd2-b43bd7 2779->2780 2781 b43bdb-b43be6 call b4350e 2779->2781 2780->2779 2782 b43bd9 2780->2782 2784 b43be9-b43c01 2781->2784 2782->2784 2786 b43c03-b43c0c 2784->2786 2787 b43c1d-b43c2e call b4350e 2784->2787 2788 b43c17 2786->2788 2789 b43c0e-b43c13 2786->2789 2793 b43c2f-b43c38 2787->2793 2788->2787 2789->2786 2791 b43c15 2789->2791 2794 b43c5f-b43c67 2791->2794 2795 b43c43-b43c48 call b4350e 2793->2795 2796 b43c3a-b43c3f 2793->2796 2797 b43c87-b43cd4 call b4350e call b43644 2794->2797 2798 b43c69-b43c6f 2794->2798 2804 b43c4e-b43c5a call b43644 2795->2804 2796->2793 2799 b43c41 2796->2799 2814 b43af9-b43bc3 2797->2814 2815 b43cda-b43d35 2797->2815 2800 b43c71-b43c78 2798->2800 2801 b43c7c-b43c81 call b43644 2798->2801 2799->2804 2800->2798 2805 b43c7a 2800->2805 2801->2797 2804->2794 2805->2797 2814->2784 2817 b43d44-b43d46 2815->2817 2819 b43d37-b43d3b 2817->2819 2820 b43d48-b43d59 2817->2820 2821 b44000-b44003 2819->2821 2822 b43d41-b43d42 2819->2822 2823 b43d5b-b43d68 2820->2823 2825 b4400e-b44013 call b20f33 2821->2825 2822->2817 2823->2823 2824 b43d6a-b43d6c 2823->2824 2826 b43d6f-b43db8 2824->2826 2826->2826 2828 b43dba-b43dc7 2826->2828 2829 b43dcc-b43e22 2828->2829 2829->2829 2830 b43e24-b43e42 2829->2830 2831 b43e44-b43e52 2830->2831 2831->2831 2832 b43e54 2831->2832 2833 b43e56-b43e95 2832->2833 2833->2833 2834 b43e97-b43e9c 2833->2834 2835 b43e9e-b43ef1 2834->2835 2835->2835 2836 b43ef3-b43f18 2835->2836 2837 b43f1f-b43f27 2836->2837 2837->2837 2838 b43f29-b43f3b 2837->2838 2839 b43f3c-b43f44 2838->2839 2839->2839 2840 b43f46-b43f53 2839->2840 2841 b43f5a-b43f62 2840->2841 2841->2841 2842 b43f64-b43f7a call b2d2d4 2841->2842 2844 b43f7f-b43f91 call b2d2b3 CreateMutexW call b2d2d4 2842->2844 2848 b43f96-b43fa7 call b2d2b3 2844->2848 2848->2825 2852 b43fa9-b4401d 2848->2852
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: #$*$-$0$?$@$X$es-ES_tradnl$message_size$message_size$se-NO$too many files open in system
                              • API String ID: 0-344358562
                              • Opcode ID: f8a58200516877da0450caa5e075b587ae3c4427e368bfca31d4ad3ad92a5c06
                              • Instruction ID: d706ca553891bdca2d481e2fd2380d909434efc5b8f75be2698e500e5abc4b9b
                              • Opcode Fuzzy Hash: f8a58200516877da0450caa5e075b587ae3c4427e368bfca31d4ad3ad92a5c06
                              • Instruction Fuzzy Hash: CDC1E431D042A88EDB45CFA9D4503ECBFF1AF5A714F2941EAD898B7242D6348B86DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2884 b48e94-b48e96 2885 b48e88-b48e90 2884->2885 2886 b48e98-b48f0f call b48652 2884->2886 2885->2884 2891 b48f10-b48f20 2886->2891 2893 b48f22-b48f3f call b48652 2891->2893 2897 b48f41-b48f4e 2893->2897 2897->2897 2898 b48f50 2897->2898 2899 b48f52-b48f5e 2898->2899 2900 b48f5f-b48f6f 2899->2900 2902 b48f71-b48fd9 call b4865e 2900->2902 2902->2899 2906 b48fdf-b48fe9 2902->2906 2907 b48feb-b49041 2906->2907 2907->2907 2908 b49043-b4907a 2907->2908 2909 b4907c-b49097 2908->2909 2911 b490a9-b490ab 2909->2911 2912 b490ad 2911->2912 2913 b49099-b490a4 2911->2913 2916 b490c1-b490da 2912->2916 2914 b490a6 2913->2914 2915 b490af-b490bb call b48652 2913->2915 2914->2911 2915->2916 2916->2909 2918 b490dc-b490e2 2916->2918 2920 b490e4-b490f5 call b4865e 2918->2920 2921 b49149-b49155 2918->2921 2927 b490f6-b490ff 2920->2927 2922 b49156-b49166 2921->2922 2926 b49168-b49196 2922->2926 2931 b49199-b491a6 2926->2931 2929 b49101-b49106 2927->2929 2930 b4910a-b49116 call b48652 2927->2930 2929->2927 2932 b49108 2929->2932 2935 b4911c-b49147 call b48652 2930->2935 2931->2931 2934 b491a8-b491ad 2931->2934 2932->2935 2937 b491b4-b491f3 2934->2937 2935->2921 2937->2937 2939 b491f5-b491ff 2937->2939 2942 b49201-b49266 2939->2942 2942->2942 2943 b49268-b4927f 2942->2943 2944 b49286-b4928e 2943->2944 2944->2944 2945 b49290-b492a5 2944->2945 2946 b492ac-b492b4 2945->2946 2946->2946 2947 b492b6-b492c5 2946->2947 2948 b492cc-b492d4 2947->2948 2948->2948 2949 b492d6-b492ee 2948->2949 2950 b492ef-b492f7 2949->2950 2950->2950 2951 b492f9-b49312 2950->2951 2952 b49319-b49321 2951->2952 2952->2952 2953 b49323-b4944b call b444a0 * 3 call b2d2d4 call b2d2b3 call b44add call b443f8 call b44add call b443f8 call b44add call b443f8 call b2d25a * 3 call b44e97 2952->2953 2986 b4944d-b4945b 2953->2986 2986->2986 2987 b4945d 2986->2987 2988 b4945f-b49496 2987->2988 2988->2988 2989 b49498-b4949f 2988->2989 2990 b494a1-b49507 2989->2990 2990->2990 2991 b49509-b4952d call b35573 2990->2991 2993 b49532 2991->2993 2994 b497e5-b497f0 2993->2994 2995 b497f2-b497f8 2994->2995 2996 b49828-b4982d 2994->2996 2995->2996 2997 b497fa-b4980c 2995->2997 2998 b49813-b4981b 2997->2998 2998->2998 2999 b4981d-b4981f 2998->2999 2999->2996 3000 b49821-b49823 call b2bd20 2999->3000 3000->2996
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$2$4vln$=Z$C$F$X$already connected$f$$fr-FR$gn-PY$invalid argument$operation would block$read only file system$l;$l;r
                              • API String ID: 0-2129979259
                              • Opcode ID: 4cc411e097180f84ef784529f3c7ca465725e8f2f0c5e92c305ce02c8d519f92
                              • Instruction ID: 4d7bdbb0315c69e30bb594ae54a7c799b759848b5684333ca7d2c69398d790d9
                              • Opcode Fuzzy Hash: 4cc411e097180f84ef784529f3c7ca465725e8f2f0c5e92c305ce02c8d519f92
                              • Instruction Fuzzy Hash: 74120071E042988BDF05DFA9D8542FEBBF1AF59300F2881E9D889A7381D6354B46DF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3002 b1dd59-b1de08 3003 b1de0b-b1de18 3002->3003 3003->3003 3004 b1de1a-b1de20 3003->3004 3005 b1de22-b1de2a 3004->3005 3006 b1de49-b1de90 3005->3006 3007 b1de2c-b1de32 3005->3007 3006->3005 3010 b1de92-b1de97 3006->3010 3008 b1de34-b1de3a 3007->3008 3009 b1de3e-b1de43 call b1cc59 3007->3009 3008->3007 3011 b1de3c 3008->3011 3009->3006 3013 b1de99-b1dee7 3010->3013 3011->3006 3013->3013 3014 b1dee9-b1df12 3013->3014 3016 b1df14-b1df21 3014->3016 3016->3016 3017 b1df23 3016->3017 3018 b1df25-b1df60 3017->3018 3018->3018 3019 b1df62-b1df6a 3018->3019 3020 b1df6c-b1dfc5 3019->3020 3020->3020 3021 b1dfc7-b1dffa call b2d2d4 call b2d2b3 GetComputerNameW 3020->3021 3026 b1e000-b1e042 3021->3026 3027 b1e1d4-b1e1d8 3021->3027 3028 b1e043-b1e050 3026->3028 3028->3028 3029 b1e052-b1e063 3028->3029 3030 b1e077-b1e079 3029->3030 3031 b1e065-b1e06e 3030->3031 3032 b1e07b-b1e089 3030->3032 3035 b1e074 3031->3035 3036 b1e1d9-b1e1e4 call b1ca32 3031->3036 3033 b1e08b-b1e091 3032->3033 3034 b1e0aa 3032->3034 3037 b1e097-b1e09d 3033->3037 3038 b1e1ef 3033->3038 3039 b1e0b0-b1e0cb call b1ca32 call b1cb10 3034->3039 3035->3030 3036->3038 3037->3033 3042 b1e09f-b1e0a4 3037->3042 3041 b1e1f5-b1e200 call b1cb10 3038->3041 3050 b1e0cd-b1e108 3039->3050 3041->3039 3042->3034 3042->3041 3050->3050 3051 b1e10a-b1e112 3050->3051 3052 b1e114-b1e16d 3051->3052 3052->3052 3053 b1e16f-b1e18e 3052->3053 3054 b1e195-b1e19c 3053->3054 3054->3054 3055 b1e19e-b1e1cf call b444cf call b44b31 call b4435e call b44b31 call b443f8 call b2d25a 3054->3055 3055->3027
                              APIs
                              • GetComputerNameW.KERNEL32(?,?,00000000,00000000), ref: 00B1DFF6
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: ComputerName
                              • String ID: ;$Component Categories$I$T$TI$callContext$invalid_argument$not supported$p
                              • API String ID: 3545744682-603468243
                              • Opcode ID: 2e196b9965f9dfa68f1c3d7902fdae705ea5b9de712d36aa323ce9c5907e4c61
                              • Instruction ID: 01c711a8a88dc5b54c17b0c8db6f92d9e2eb5b83e8c5045ed818d237dfbc7a3e
                              • Opcode Fuzzy Hash: 2e196b9965f9dfa68f1c3d7902fdae705ea5b9de712d36aa323ce9c5907e4c61
                              • Instruction Fuzzy Hash: 1ED1D372E042AC9EDB02CFAD94842EDBFF1BF19300F5945F9D888A7242D7758A49DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3067 b1d95c-b1d979 3068 b1d980-b1d988 3067->3068 3068->3068 3069 b1d98a-b1d9c6 3068->3069 3070 b1d9c8-b1d9d5 3069->3070 3070->3070 3071 b1d9d7 3070->3071 3072 b1d9d9-b1da10 3071->3072 3072->3072 3073 b1da12-b1da20 3072->3073 3074 b1da23-b1da71 3073->3074 3074->3074 3075 b1da73-b1da95 3074->3075 3076 b1da97-b1daa4 3075->3076 3076->3076 3077 b1daa6-b1daa8 3076->3077 3078 b1daab-b1dae8 3077->3078 3078->3078 3079 b1daea-b1daf7 3078->3079 3080 b1dafd-b1db58 3079->3080 3080->3080 3081 b1db5a-b1db8d call b2d2d4 call b2d2b3 GetUserNameW 3080->3081 3086 b1db93-b1dbd1 3081->3086 3087 b1dd54-b1dd58 3081->3087 3088 b1dbd3-b1dbd9 3086->3088 3089 b1dc0a 3086->3089 3091 b1dbf2-b1dbfd call b1cb10 3088->3091 3092 b1dbdb-b1dbe1 3088->3092 3090 b1dc10-b1dc24 3089->3090 3094 b1dc26-b1dc33 3090->3094 3099 b1dc03-b1dc08 call b1ca32 3091->3099 3092->3088 3095 b1dbe3-b1dbe8 3092->3095 3094->3094 3097 b1dc35-b1dc37 3094->3097 3095->3089 3098 b1dbea-b1dbf0 3095->3098 3100 b1dc39-b1dc74 3097->3100 3098->3099 3099->3090 3100->3100 3102 b1dc76-b1dc7e 3100->3102 3104 b1dc80-b1dcdc 3102->3104 3104->3104 3105 b1dcde-b1dd0a 3104->3105 3106 b1dd11-b1dd19 3105->3106 3106->3106 3107 b1dd1b-b1dd4f call b444cf call b44b31 call b4435e call b44b31 call b443f8 call b2d25a 3106->3107 3107->3087
                              APIs
                              • GetUserNameW.ADVAPI32(?,?,00000000,6B9470A8), ref: 00B1DB89
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: NameUser
                              • String ID: ,$@$ModuleCollection$]$module$rm-CH$threadId
                              • API String ID: 2645101109-2038467357
                              • Opcode ID: 685853318f035f7be32dacc2534ba569fa179369aeb9ca9420924186ceb3cdb1
                              • Instruction ID: d9f4ec1c9202a58ac246fd2e52bb7e48670cbdce14cb3abc9a1c9f5930cb930b
                              • Opcode Fuzzy Hash: 685853318f035f7be32dacc2534ba569fa179369aeb9ca9420924186ceb3cdb1
                              • Instruction Fuzzy Hash: FAB17571A042AC8FDB12DFADA8902EE7FF1BF19300F5905F9D898A7342C2755A45DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3119 b1d1ff-b1d289 3120 b1d28b-b1d291 3119->3120 3121 b1d293-b1d299 3120->3121 3122 b1d2a9 call b1cc59 3120->3122 3121->3120 3124 b1d29b-b1d2a0 3121->3124 3125 b1d2ae-b1d2c5 call b1ca32 3122->3125 3124->3125 3126 b1d2a2-b1d2a7 call b1cb10 3124->3126 3131 b1d2c7-b1d2d4 3125->3131 3126->3125 3131->3131 3132 b1d2d6-b1d2d8 3131->3132 3133 b1d2da-b1d315 3132->3133 3133->3133 3134 b1d317-b1d324 3133->3134 3135 b1d327-b1d359 3134->3135 3136 b1d35b-b1d361 3135->3136 3137 b1d363-b1d369 3136->3137 3138 b1d37a 3136->3138 3137->3136 3139 b1d36b-b1d370 3137->3139 3140 b1d380-b1d382 3138->3140 3139->3140 3142 b1d372-b1d378 3139->3142 3141 b1d388-b1d3a0 call b1cb10 3140->3141 3145 b1d3a2-b1d3a8 3141->3145 3142->3141 3146 b1d3b4 3145->3146 3147 b1d3aa-b1d3b0 3145->3147 3149 b1d3ba-b1d3f8 call b1cc59 3146->3149 3147->3145 3148 b1d3b2 3147->3148 3148->3149 3149->3135 3152 b1d3fe-b1d42b 3149->3152 3153 b1d42e-b1d43b 3152->3153 3153->3153 3154 b1d43d 3153->3154 3155 b1d43f-b1d445 3154->3155 3156 b1d451 call b1ca32 3155->3156 3157 b1d447-b1d44d 3155->3157 3160 b1d456-b1d468 call b1ca32 3156->3160 3157->3155 3159 b1d44f 3157->3159 3159->3160 3163 b1d469-b1d4a4 3160->3163 3163->3163 3164 b1d4a6-b1d4aa 3163->3164 3165 b1d4ac-b1d4f7 3164->3165 3165->3165 3166 b1d4f9-b1d510 3165->3166 3167 b1d517-b1d51f 3166->3167 3167->3167 3168 b1d521-b1d530 3167->3168 3169 b1d537-b1d53f 3168->3169 3169->3169 3170 b1d541-b1d581 3169->3170 3171 b1d582-b1d58b 3170->3171 3172 b1d5aa-b1d5b1 3171->3172 3173 b1d58d-b1d590 3171->3173 3174 b1d5b6-b1d5b8 3172->3174 3173->3171 3175 b1d592-b1d597 3173->3175 3178 b1d5be-b1d5cb 3174->3178 3176 b1d5b3 3175->3176 3177 b1d599-b1d5a8 call b1cd55 3175->3177 3176->3174 3177->3178 3180 b1d5cd-b1d5d4 3178->3180 3182 b1d5d5-b1d5dc 3180->3182 3183 b1d5ed-b1d5ef 3182->3183 3184 b1d5de-b1d5e9 3182->3184 3186 b1d5f5-b1d619 call b1ca32 3183->3186 3184->3182 3185 b1d5eb 3184->3185 3185->3186 3186->3180 3189 b1d61b-b1d623 3186->3189 3190 b1d625-b1d660 3189->3190 3190->3190 3191 b1d662-b1d666 3190->3191 3192 b1d668-b1d6b6 3191->3192 3192->3192 3193 b1d6b8-b1d6f5 3192->3193 3194 b1d6fc-b1d709 3193->3194 3194->3194 3195 b1d70b 3194->3195 3196 b1d70d-b1d748 3195->3196 3196->3196 3197 b1d74a-b1d752 3196->3197 3198 b1d754-b1d7b0 3197->3198 3198->3198 3199 b1d7b2-b1d7e1 3198->3199 3200 b1d7e2-b1d7eb 3199->3200 3201 b1d803 3200->3201 3202 b1d7ed-b1d7f2 3200->3202 3204 b1d806-b1d817 call b1cd55 3201->3204 3202->3200 3203 b1d7f4-b1d801 3202->3203 3203->3204 3207 b1d819-b1d826 3204->3207 3207->3207 3208 b1d828 3207->3208 3209 b1d82a-b1d865 3208->3209 3209->3209 3210 b1d867-b1d86b 3209->3210 3211 b1d86d-b1d8b8 3210->3211 3211->3211 3212 b1d8ba-b1d8cf 3211->3212 3213 b1d8d6-b1d8de 3212->3213 3213->3213 3214 b1d8e0-b1d95b call b2d2d4 call b2d2b3 call b444cf call b2d2d4 call b2d2b3 call b44b31 call b443f8 call b2d25a 3213->3214
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: *pK$9$R$RtlRegisterFeatureConfigurationChangeNotification$ff-Latn-NG$invalid string position$message$om-ET$originatingContextId$rm-CH$x
                              • API String ID: 0-2873833578
                              • Opcode ID: c44d2873a5ffebf924f6bd847d66dc979a420c173da437cbadf9049b6fc7e64c
                              • Instruction ID: b8edcd82d340d6ff9061e8101b92ef4f150418f035151039d2244eecba213bb3
                              • Opcode Fuzzy Hash: c44d2873a5ffebf924f6bd847d66dc979a420c173da437cbadf9049b6fc7e64c
                              • Instruction Fuzzy Hash: 7D22C831A042988EDB15CFED98902EDBFF1AF1A300F9945FAD8D9A7342C6355945CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3233 b1e6b9-b1e70e 3234 b1e710-b1e71d 3233->3234 3234->3234 3235 b1e71f 3234->3235 3236 b1e721-b1e75c 3235->3236 3236->3236 3237 b1e75e-b1e775 3236->3237 3238 b1e778-b1e7c6 3237->3238 3238->3238 3239 b1e7c8-b1e7ee 3238->3239 3240 b1e7f0-b1e7fd 3239->3240 3240->3240 3241 b1e7ff 3240->3241 3242 b1e801-b1e82f 3241->3242 3243 b1e830-b1e837 3242->3243 3244 b1e839-b1e844 3243->3244 3245 b1e848 3243->3245 3244->3243 3246 b1e846 3244->3246 3247 b1e84e-b1e878 call b1cb10 3245->3247 3246->3247 3247->3242 3250 b1e87a-b1e883 3247->3250 3251 b1e889-b1e899 3250->3251 3252 b1e8a4-b1e8a6 3251->3252 3253 b1e8a8 3252->3253 3254 b1e89b-b1e89f 3252->3254 3257 b1e8b0-b1e918 call b1ca32 3253->3257 3255 b1e8a1-b1e8a2 3254->3255 3256 b1e8aa 3254->3256 3255->3252 3256->3257 3257->3251 3260 b1e91e-b1e940 3257->3260 3261 b1e947-b1e94f 3260->3261 3261->3261 3262 b1e951-b1e95d 3261->3262 3263 b1e964-b1e96c 3262->3263 3263->3263 3264 b1e96e-b1e98e 3263->3264 3265 b1e995-b1e99c 3264->3265 3265->3265 3266 b1e99e-b1e9b1 3265->3266 3267 b1e9b8-b1e9c0 3266->3267 3267->3267 3268 b1e9c2-b1e9e2 call b2d2d4 call b2d2b3 3267->3268 3273 b1e9e4-b1e9e6 3268->3273 3274 b1ea08-b1ea12 3273->3274 3275 b1e9e8-b1ea03 call b44c70 * 2 3273->3275 3277 b1ea14-b1ea1a 3274->3277 3278 b1ea2c 3274->3278 3293 b1ec09-b1ec0d 3275->3293 3281 b1ea7a call b1cb10 3277->3281 3282 b1ea1c-b1ea23 3277->3282 3279 b1ea32-b1ea65 call b1ca32 3278->3279 3290 b1ea67-b1ea6d 3279->3290 3291 b1ea9d-b1eacd call b1cb10 3279->3291 3288 b1ea7f-b1ea90 call b1cd55 3281->3288 3282->3277 3286 b1ea25-b1ea2a 3282->3286 3286->3278 3286->3288 3288->3279 3294 b1ea92-b1ea97 call b1cc59 3290->3294 3295 b1ea6f-b1ea76 3290->3295 3301 b1eacf-b1eadc 3291->3301 3294->3291 3295->3290 3299 b1ea78 3295->3299 3299->3291 3301->3301 3303 b1eade 3301->3303 3304 b1eae0-b1eb1b 3303->3304 3304->3304 3305 b1eb1d-b1eb21 3304->3305 3306 b1eb23-b1eb71 3305->3306 3306->3306 3307 b1eb73-b1ec04 call b444cf call b44b31 call b4435e call b44b31 call b4435e call b44b31 call b443f8 call b2d25a 3306->3307 3307->3293
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: #$,$1$L$Local\SM0:%d:%d:%hs$a$filename_too_long$lghp$lineNumber$ms-MY$ur-PK
                              • API String ID: 0-3856692252
                              • Opcode ID: 70ca5a64c2caa13ca31251fc9897d46743a9cce0e9152696037909abd3e76d71
                              • Instruction ID: d628b5fef45501604a238bcc6ada711933d5acf0c9d23957afd4b178dfbddbd4
                              • Opcode Fuzzy Hash: 70ca5a64c2caa13ca31251fc9897d46743a9cce0e9152696037909abd3e76d71
                              • Instruction Fuzzy Hash: DFE11931A042988EDB11CFB9D8413EDBFF1AF59300F5945E5D898A7392D6748E86CF60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3323 b1e205-b1e2b6 3324 b1e2bd-b1e2ca 3323->3324 3324->3324 3325 b1e2cc 3324->3325 3326 b1e2ce-b1e314 3325->3326 3326->3326 3327 b1e316-b1e338 3326->3327 3328 b1e33b-b1e391 3327->3328 3328->3328 3329 b1e393-b1e3b3 3328->3329 3330 b1e3ba-b1e3c7 3329->3330 3330->3330 3331 b1e3c9-b1e3d3 3330->3331 3332 b1e3de-b1e3e0 3331->3332 3333 b1e3e2 3332->3333 3334 b1e3d5-b1e3d9 3332->3334 3335 b1e3ea-b1e3f2 3333->3335 3336 b1e3e4 3334->3336 3337 b1e3db-b1e3dc 3334->3337 3338 b1e3f7-b1e43d 3335->3338 3336->3335 3337->3332 3338->3338 3339 b1e43f-b1e445 3338->3339 3340 b1e447-b1e49a 3339->3340 3340->3340 3341 b1e49c-b1e4d6 call b2d2d4 call b2d2b3 3340->3341 3347 b1e6b5-b1e6b8 3341->3347 3348 b1e4dc-b1e514 3341->3348 3349 b1e515-b1e522 3348->3349 3349->3349 3350 b1e524-b1e538 3349->3350 3351 b1e53b-b1e581 3350->3351 3351->3351 3352 b1e583-b1e58a 3351->3352 3353 b1e58c-b1e5b5 3352->3353 3354 b1e5b7-b1e5bd 3353->3354 3355 b1e5d8-b1e62a call b1ca32 3353->3355 3356 b1e5ca-b1e5d2 call b1cb10 3354->3356 3357 b1e5bf-b1e5c6 3354->3357 3355->3353 3363 b1e630-b1e6b0 call b444cf call b44b31 call b4435e call b44b31 call b443f8 call b2d25a 3355->3363 3356->3355 3357->3354 3359 b1e5c8 3357->3359 3359->3355 3363->3347
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: &$,$Q$T$fileName$generic$nf8$originatingContextId$wilActivity$zh-CHT
                              • API String ID: 0-2616223789
                              • Opcode ID: d7591e951a853c8fbe8cbedf1e86188a361dec88f344b9ee2eb1001ccf57c074
                              • Instruction ID: f481a3bc106b391ed63e588f70617feced6edf5da98f8feac28ea91e1e772dde
                              • Opcode Fuzzy Hash: d7591e951a853c8fbe8cbedf1e86188a361dec88f344b9ee2eb1001ccf57c074
                              • Instruction Fuzzy Hash: 1DD1CF71D082988BDB01CFB999003EDBFF1AF65304F5946EAD898A7342D3749A86CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • NtPssCaptureVaSpaceBulk.NTDLL(00000000,00000061), ref: 00B59762
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: BulkCaptureSpace
                              • String ID:
                              • API String ID: 1541563799-0
                              • Opcode ID: e7f6e9b7806ce31a3c1bcaa21fbe050c7a2ca888be0af505357316badd405d1c
                              • Instruction ID: 69d61087dde54aa048bc98c838d7c2e0c961cb336abe2320dfbf138e0c31b761
                              • Opcode Fuzzy Hash: e7f6e9b7806ce31a3c1bcaa21fbe050c7a2ca888be0af505357316badd405d1c
                              • Instruction Fuzzy Hash: B4F0D4B2520300DFEB02DF14EC217A23BA1F704212B4846E5E849F32A0EB359814DB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2734 b32f99-b3300d 2737 b3300f-b3306a 2734->2737 2737->2737 2738 b3306c-b330e3 2737->2738 2739 b330e9-b330f7 2738->2739 2739->2739 2740 b330f9 2739->2740 2741 b330fb-b33140 2740->2741 2741->2741 2742 b33142-b33149 2741->2742 2743 b3314b-b331a1 2742->2743 2743->2743 2744 b331a3-b331cd 2743->2744 2745 b331cf-b331dd 2744->2745 2745->2745 2746 b331df 2745->2746 2747 b331e1-b331e3 2746->2747 2748 b331e8-b331f7 2747->2748 2750 b331f9-b33267 2748->2750 2750->2747 2752 b3326d-b33272 2750->2752 2753 b33274-b332cf 2752->2753 2753->2753 2754 b332d1-b33340 2753->2754 2755 b33342-b33350 2754->2755 2755->2755 2756 b33352-b3335f 2755->2756 2757 b33364-b333a0 2756->2757 2757->2757 2758 b333a2-b333b2 2757->2758 2759 b333b7-b3340d 2758->2759 2759->2759 2760 b3340f-b33438 2759->2760 2761 b3343a-b33448 2760->2761 2761->2761 2762 b3344a 2761->2762 2763 b3344c-b3348e 2762->2763 2763->2763 2764 b33490-b33497 2763->2764 2765 b33499-b334f4 2764->2765 2765->2765 2766 b334f6-b3350d 2765->2766 2767 b33517-b33522 2766->2767 2767->2767 2768 b33524-b33534 2767->2768 2769 b3353b-b33543 2768->2769 2769->2769 2770 b33545-b33585 call b2d2d4 call b2d2b3 InternetOpenW 2769->2770 2775 b33587-b335a7 2770->2775 2776 b335a8-b335b3 2775->2776 2776->2776 2777 b335b5-b35572 2776->2777
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: '$.Bu{failureId$2$@B$D$HKEY_DYN_DATA$W$b$connection reset$mni-IN$operation_not_supported$zh-Hant
                              • API String ID: 0-2796461677
                              • Opcode ID: ff9c621e8a641308f9e8ef619be92ff6e474effcc82c59be089a9330abd501dc
                              • Instruction ID: 0d727a1d105bc0a568f9ce929081a1c4c98e861c6d4fbf64eaa3ccc868273eba
                              • Opcode Fuzzy Hash: ff9c621e8a641308f9e8ef619be92ff6e474effcc82c59be089a9330abd501dc
                              • Instruction Fuzzy Hash: 2BF1B531A082988EDF55CFA8A8543EDBFF16F1A210F2846F9D8C8E7352D5758A85CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2854 b1f263-b1f2cc 2855 b1f2d3-b1f2e1 2854->2855 2855->2855 2856 b1f2e3 2855->2856 2857 b1f2e5-b1f32e 2856->2857 2857->2857 2858 b1f330-b1f337 2857->2858 2859 b1f339-b1f38f 2858->2859 2859->2859 2860 b1f391-b1f3bc 2859->2860 2861 b1f3be-b1f3cc 2860->2861 2861->2861 2862 b1f3ce 2861->2862 2863 b1f3d0-b1f416 2862->2863 2863->2863 2864 b1f418-b1f420 2863->2864 2865 b1f422-b1f467 2864->2865 2866 b1f469-b1f46d 2865->2866 2867 b1f478 2866->2867 2868 b1f46f-b1f474 2866->2868 2870 b1f47e-b1f4a5 2867->2870 2868->2866 2869 b1f476 2868->2869 2869->2870 2870->2865 2871 b1f4ab-b1f4d7 2870->2871 2872 b1f4de-b1f4e6 2871->2872 2872->2872 2873 b1f4e8-b1f54f call b2d2d4 call b2d2b3 GlobalMemoryStatusEx 2872->2873 2878 b1f551-b1f594 2873->2878 2879 b1f596-b1f5b5 call b597f0 * 2 2873->2879 2880 b1f5ba-b1f5bd 2878->2880 2879->2880
                              APIs
                              • GlobalMemoryStatusEx.KERNELBASE(?,00000006,00000031,00000000,00000000), ref: 00B1F54B
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: GlobalMemoryStatus
                              • String ID: ($+$0$1$@$Locale$RtlRegisterFeatureConfigurationChangeNotification$Z$a$argument list too long$d#
                              • API String ID: 1890195054-2893979789
                              • Opcode ID: 13c6b6ca1d525dac2d5d16254407baf5336fab22decd5e658e4dd2581b1697c8
                              • Instruction ID: 78e6bbbc16c3ca075309286b49931a101f110299b2798a7d51a136d6a30c5ab8
                              • Opcode Fuzzy Hash: 13c6b6ca1d525dac2d5d16254407baf5336fab22decd5e658e4dd2581b1697c8
                              • Instruction Fuzzy Hash: FE91B271E052988EEB11CFB9D4502EDBFF1AF56340F1482AAD894B3342D3745A8ACF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3375 b2d11f-b2d138 3376 b2d13f-b2d147 3375->3376 3376->3376 3377 b2d149-b2d156 3376->3377 3378 b2d157-b2d162 3377->3378 3379 b2d173-b2d17e call b2ca1d 3378->3379 3380 b2d164-b2d169 3378->3380 3384 b2d184-b2d190 3379->3384 3380->3378 3382 b2d16b-b2d171 3380->3382 3382->3384 3385 b2d191-b2d19c 3384->3385 3386 b2d19e-b2d1a3 3385->3386 3387 b2d1ad 3385->3387 3386->3385 3388 b2d1a5-b2d1ab 3386->3388 3389 b2d1b3-b2d22a call b2c9a6 call b2d115 RtlAllocateHeap 3387->3389 3388->3389 3394 b2d254-b2d259 3389->3394 3395 b2d22c-b2d236 3389->3395 3396 b2d23d-b2d245 3395->3396 3396->3396 3397 b2d247-b2d251 call b443f8 3396->3397 3397->3394
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,00000014,0000003F), ref: 00B2D21F
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID: '$=$E$invalid_argument$lineNumber
                              • API String ID: 1279760036-62853365
                              • Opcode ID: a2a9598c0c6f96ab17fd328ceb9f9e29ab088a0ce3c626c29461de692d5a38e7
                              • Instruction ID: f0b7a00238010f29cea59b459b9473dde3de109c72e28c303fb259ad3bdedb28
                              • Opcode Fuzzy Hash: a2a9598c0c6f96ab17fd328ceb9f9e29ab088a0ce3c626c29461de692d5a38e7
                              • Instruction Fuzzy Hash: A0314872E00328AFEB048F68EC46ADDB7F5EF90315F1482A5E459BB291F7746980CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcAddress.KERNELBASE(00000000,00000000), ref: 00B2D2C0
                                • Part of subcall function 00B2D25A: HeapFree.KERNEL32(00000000,00B2C92B,?), ref: 00B2D2AB
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHeapProc
                              • String ID:
                              • API String ID: 4280525199-0
                              • Opcode ID: 430e64f59d13595127b78d336638fcebf5dd771e011bfbbe02d99df0f54e9fbe
                              • Instruction ID: b39019d8d199dc3cafd039ff3535a33aad7d0d133cc0feb78b464bb3a91e7b42
                              • Opcode Fuzzy Hash: 430e64f59d13595127b78d336638fcebf5dd771e011bfbbe02d99df0f54e9fbe
                              • Instruction Fuzzy Hash: 9BC01222600230538624223A7C0ADABD9ED9ED66B230A00A6F808D3324DE648C0281E0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateFree
                              • String ID: wA$!$"/$";6D$#*$$$%hs(%u)\%hs!%p: $%lS\%lS$+3{m$.$/7$0$40I$7$7$=$=$@$A$A$APPID$ActivityStoppedAutomatically$ActivityStoppedAutomatically$B$CallContext:[%hs] $Delete$ForceRemove$HKEY_CURRENT_CONFIG$HostProcessExecutionStop$Hr|$InstallDirectory$J$J$9$L3]0$Locale$Locale$M$Msg:[%ws] $O$PartA_PrivTags$PartA_PrivTags$RtlDisownModuleHeapAllocation$Software\Microsoft\Windows Search\Tracing\EventThrottleState$T$TelemetryAssertDiagTrack$U)hr$Wadvapi32.dll$X].$Z$`$address family not supported$address_in_use$address_in_use$am-ET$argument list too long$b$b$bin-NG$bn-IN$callContext$callContext$connection_reset$connection_reset$currentContextId$de-DE$destination_address_required$f+-$fa-IR$fileName$filename_too_long$gn-PY$ha-Latn-NG$hresult$ibb-NG$interrupted$invalid string position$invalid string position$invalid_argument$ka-GE$kk-KZ$km-KH$kn-IN$kok-IN$lineNumber$lo-LA$message$module$ms-MY$my-MM$network_unreachable$no lock available$no protocol option$no such process$not_a_socket$onecoreuap\base\AppModel\Search\common\include\PrivateComActivationHelper.h$onecoreuap\base\AppModel\Search\common\include\lmstr.hxx$onecoreuap\base\appmodel\search\search\search\gather\usractivity\waitthreadhelper.cxx$operation not supported$originatingContextMessage$originatingContextName$permission denied$protocol_not_supported$r$ru-RU$ru-RU$sk-SK$sr-BA-Cyrl$sr-SP-Cyrl$std::exception: %hs$sw-KE$sw-KE$threadId$ti-ET$timed_out$too many files open$too many links$wE$wilActivity$wilResult$wrong protocol type$x?84$zh-CHS$zh-HansA$>ZX
                              • API String ID: 2488874121-3677608480
                              • Opcode ID: 86a13cd2d8de9cd746b15fbaeacae67e0bde1cc629b6d8cb58931d12db9cc5df
                              • Instruction ID: 679213bc44a701fddf13f96c237fd6af9b356560507794e7075597985d996571
                              • Opcode Fuzzy Hash: 86a13cd2d8de9cd746b15fbaeacae67e0bde1cc629b6d8cb58931d12db9cc5df
                              • Instruction Fuzzy Hash: C3B3D471A042A88FDB15CFA8D8543EDBFF1AF5A300F2846E9D488A7342DB744A85CF55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: "$#$#$#U$$$$$&$&$'$'$($)$+$,$1$2$3$3$4$5$5$5$7$7TR$;$;Qvk$<$=$=$>$@DiV$A$B$C$C$C$D$EventThrottleBlockPeriodMs$FileType$H$I$InstallDirectory$Interface$L$M$N3$P$P$PPTP00W$PartA_PrivTags$PartA_PrivTags$R$R(PL$S$U$V$V$V$X$[$\X)#^$]$^$^$a$am-ET$c$c$connection already in progress$d$d$d/!L$destination_address_required$dv-MV$e3r$failureId$failureType$is-IS$isBackedOff$kl-GL$ko-KR$no link$onecoreuap\base\AppModel\Search\common\include\lmstr.hxx$operation_in_progress$operation_not_supported$originatingContextMessage$originatingContextName$q$result$si-LK$sl-SI$sq-AL$std::exception: %hs$system$ta-IN$tk-TM$value too large$wilActivity
                              • API String ID: 0-1554866968
                              • Opcode ID: 159a5c2eb45c5326b2b5f8a05dfa8b5e37d101d1bd32a000dd2c0717cbe4faf7
                              • Instruction ID: 57ed1dc1d4cfb9c72775237d8262f7b2b1314adb112c8abf4dd0149a11a38733
                              • Opcode Fuzzy Hash: 159a5c2eb45c5326b2b5f8a05dfa8b5e37d101d1bd32a000dd2c0717cbe4faf7
                              • Instruction Fuzzy Hash: 7363F931E052A88FDB15CFA9A8947DDBBF1AF59300F1486FAD89CA7342C6745A85CF10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $ $"$"$$$%$'$*$+$+$,$,$.$/$0$0$1$3$4$6$7$8$8$8$8$;$<$>$@$@$@$B$C$D$D$E$F$G$H$I$K$K$LogHr$M$Module$N$O$P$R$S$T$V$W$X$Y$Z$[$]$^$^$^$^$`$`$a$c$d$d$ky-KG
                              • API String ID: 0-1522384126
                              • Opcode ID: 570cec24fd7cc4e25d17a2bec5d602dfc5966513b9ef4c76f46bc1aca7814916
                              • Instruction ID: 7ee020b087d91fb13088e93435473428636506c2d8bc6605d7935122acf4f897
                              • Opcode Fuzzy Hash: 570cec24fd7cc4e25d17a2bec5d602dfc5966513b9ef4c76f46bc1aca7814916
                              • Instruction Fuzzy Hash: C8B29D71D046598BEB25CF78DC953DDBBB0AF56304F1483DAD058BA292DB752AC28F00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AddressAllocateFreeProc
                              • String ID: $!$!$!{,$"$#$%iG@$&$&$'$($,2:s$3$4$4$5$5$5$6$9$:$;$=$=$>$E$H$H$HostProcessExecutionStop$I$L$P$PartA_PrivTags$Q$RtlNtStatusToDosErrorNoTeb$V$V2Pl$Y$Z$]$address family not supported$callContext$currentContextMessage$currentContextName$d$e$file exists$ja-JP$lineNumber$originatingContextMessage$sr-SP-Cyrl$sr-SP-Latn$string too long$unknown error$ur-PK$wrong protocol type
                              • API String ID: 886897068-1189956828
                              • Opcode ID: 68c8aeffb7715594d27b005aa338532bad515538e88e83ec87efc1e2fc7727ed
                              • Instruction ID: 1b8d0a2c4b8d40b5824ce9666657ac3e91fa511aa0e4082bd392d983cff31f1c
                              • Opcode Fuzzy Hash: 68c8aeffb7715594d27b005aa338532bad515538e88e83ec87efc1e2fc7727ed
                              • Instruction Fuzzy Hash: E343CB7150C3808FD325DF38D4517EAFBE0AFDA308F148A6EE5D8A7292E77495858B42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AddressAllocateFreeProc
                              • String ID: #$%lS\%lS$'$($($-$.$1$2$6$8$:$:$;$>$>$?$A$APPID$B$CallContext:[%hs] $G$G$H$O$Q$Q$b$b$b$b$currentContextId$currentContextName$device or resource busy$ee$eu-ES$ig-NG$is-IS$la-001$onecoreuap\base\appmodel\search\common\pkmutild\cregistry.cxx$operation not supported$originatingContextName$originatingContextName$s$tWU,$too many links$wilResult$}
                              • API String ID: 886897068-1057399954
                              • Opcode ID: 206dc046a7a9ce20204528313c5254f06bd7e465efb7a65c59beedba7ba8389c
                              • Instruction ID: 8cec48108b8a6082da93107464539ab153f42b3a3ff9460b35e24608eaa745ca
                              • Opcode Fuzzy Hash: 206dc046a7a9ce20204528313c5254f06bd7e465efb7a65c59beedba7ba8389c
                              • Instruction Fuzzy Hash: 7E53ED7150C7808FD325DF38D89139EFBE1AFDA308F148A6EE1D897292DB7495858B42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $!$"$$$($,$.$0$1$1$2$6$7$:$=$>$?$A$A$B$C$D$D$E$G$H$I$J$M$P$Q$R$S$T$T$V$V$W$X$X$Y$[$[$]$c$c10$no_buffer_space$zh-CHS
                              • API String ID: 0-4018895200
                              • Opcode ID: e306e7c737bbde3d1899fb5b25530d73d0ca87703d39fc7055f888f678ce7d54
                              • Instruction ID: ef9cbf2aa9c205b570e84c09df62a6c377f6cc25c6ca9795ea5607ad6551090d
                              • Opcode Fuzzy Hash: e306e7c737bbde3d1899fb5b25530d73d0ca87703d39fc7055f888f678ce7d54
                              • Instruction Fuzzy Hash: BA528F71C152598BDB25CF38C9563DCFBB0AF5A348F1493DAD058B6292EB752AC28F04
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: #$%$%$'$)$+$+$+$-$-$-$.$3$6$7$8$@$A$A$D$D$E$E$E$FilterProcessBackoff$HostProcessExecution$I$L$M$NtQueryWnfStateData$P$S$S$SECURITY$T$`$`$address not available$argument out of domain$c$message$onecoreuap\base\AppModel\Search\common\include\errormsg_common.hxx$sr-Cyrl-BA$wilActivity$]gS
                              • API String ID: 0-2953502772
                              • Opcode ID: a08d056200f8393b4230f88cfc169f6db4ef580ccc64137eaeae5bf656291d85
                              • Instruction ID: 2674d193debbfd379def2cd1ffa356e61c2633624507d4e7dd1923d04815b4b8
                              • Opcode Fuzzy Hash: a08d056200f8393b4230f88cfc169f6db4ef580ccc64137eaeae5bf656291d85
                              • Instruction Fuzzy Hash: DD92BCB1D042688FEB14CF68D885BDDBBB0AF49314F2482DAD559BB292D7751AC2CF10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHeapProc
                              • String ID: !$"$$$$$($+$<unknown>$>$AB$C$Cwp$H$K$K$NtUpdateWnfStateData$Q7$RtlSubscribeWnfStateChangeNotification$SO1-$V$W$Y$\$_$a$assertVersion$c$connection reset$currentContextMessage$fileName$fr-FR$km-KH$lineNumber$not_connected$operation would block$originatingContextMessage$po-$xh-ZA$VAu$W:M
                              • API String ID: 4280525199-292557719
                              • Opcode ID: 25f6531c457735ea732deafcd33672e159f6b6b4258b91d1bc3bcc82e6bb2e30
                              • Instruction ID: 51b1b547fda0cd81506ae2a53ce731c6e223deeaee753b6004707ca7a7f22dbf
                              • Opcode Fuzzy Hash: 25f6531c457735ea732deafcd33672e159f6b6b4258b91d1bc3bcc82e6bb2e30
                              • Instruction Fuzzy Hash: A2F2BF71E182A88FDB15CFA9D8513EDBBF1AF59300F1481EAD898A7342D7744A86CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $$&$'$,$/$/$2$3$4$5$AppID$I$M$PartA_PrivTags$RtlUnregisterFeatureConfigurationChangeNotification$S$S$Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}$T$U9.$X$Y$[$\$_$a$fileName$filename_too_long$function$hresult$illegal byte sequence$m$n=$ne-NP$onecoreuap\base\appmodel\search\search\search\gather\fltrhost\fltrhost.cxx$read only file system$sr-Latn-CS$threadId$.
                              • API String ID: 0-2740653080
                              • Opcode ID: de0a1d23ab02d967f0c41ddf52f5bb684eb419db2a4801e49c1db715cfeddc65
                              • Instruction ID: cb385b527516e28c7b1f8c6d5ed6b493e9d8804929b38edb6c3d88d727fa76e5
                              • Opcode Fuzzy Hash: de0a1d23ab02d967f0c41ddf52f5bb684eb419db2a4801e49c1db715cfeddc65
                              • Instruction Fuzzy Hash: 84D2C831A042A98FDB15CFA9E8903EDBBF1AF59300F1445FAD89CE7342D6744A85CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: !$"$&$-$/$1$3H$:$;$<$Delete$E'$EventThrottleFlushPeriodMs$J$M$PartA_PrivTags$R$Software\Microsoft\Windows Search\Tracing\EventThrottleState$XH@}$Z)$`$address family not supported$cross device link$currentContextId$host_unreachable$l$module$no such file or directory$onecoreuap\base\appmodel\search\search\search\gather\usractivity\waitthreadhelper.cxx$originatingContextName$result$se-NO$sr-Cyrl-BA$sr-SP-Cyrl$wilActivity$zh-CHT$|
                              • API String ID: 3298025750-1342568755
                              • Opcode ID: 984de7525d3e3861ce3fe3e33b0fd7b3271ee74f918e9d5ab72ed8869c44ce3f
                              • Instruction ID: 88a020edd612b03b0a78a75d531ace82918784a6c92296be951cd23dda31068a
                              • Opcode Fuzzy Hash: 984de7525d3e3861ce3fe3e33b0fd7b3271ee74f918e9d5ab72ed8869c44ce3f
                              • Instruction Fuzzy Hash: 37C2C631E052988FDB16CFA898507EDBFF1AF59300F1846E9D898A7382D7758A46CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $$&$*$/$1$2$7$9$>$A$ActivityError$AppID$C$D$EventThrottleMaxControlPeriodMs$G$HKEY_PERFORMANCE_DATA$I$J$M$M$O$O/$Rn$U$X7$`$bOO/$currentContextMessage$de-DE$et-EE$h$lb-LU$resource unavailable try again$result$|B
                              • API String ID: 0-1831932925
                              • Opcode ID: 3f92b33d83f03113cfd984bc4720d977774dfeed1e4ba7e3a7a9b657fc2cfa1d
                              • Instruction ID: e42e3725e6b0a4d34059db476e88197a1aa83f76a1f84e387c730a0060cd105b
                              • Opcode Fuzzy Hash: 3f92b33d83f03113cfd984bc4720d977774dfeed1e4ba7e3a7a9b657fc2cfa1d
                              • Instruction Fuzzy Hash: FDB2CE71D052A88BEB16CFA9E8443DCBBF1AF59304F1486EAD88CAB341D7745A85CF14
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $!$!$"$#$$$($+$,$3$3$7$:$;$@$B$B$G$H$J$M$O$T$X$[$^$`$`$b$c$c$d$lineNumber$message
                              • API String ID: 0-2955436240
                              • Opcode ID: 3e9e9dedd5df7f09522747fd8d8381826f731fcf5dff30037e74253cbccb6cdd
                              • Instruction ID: 54dcfe39dffd5e13f77741a62b60cb2c6a7d77bcd33b4e7994b78c5a970bb475
                              • Opcode Fuzzy Hash: 3e9e9dedd5df7f09522747fd8d8381826f731fcf5dff30037e74253cbccb6cdd
                              • Instruction Fuzzy Hash: E722ABB1D043688BDB21CF78D8853DDBBB1AF5A304F1086DAC599B7282D7B52AC58F50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: %hs!%p: $'R$.Bu{failureId$0$2<-&$2v?$6$8B$=$B$B$Fbad allocation$HostProcessExecution$K$KV$PartA_PrivTags$R$R379$`$currentContextName$e-mq$executable format error$gu-IN$invalid string position$k:mD$ks-Arab$originatingContextName$s$sr-BA-Latn$timed_out$zh-Hant$l$p u
                              • API String ID: 0-98647790
                              • Opcode ID: f5a40e020249c264974185b8c2e82627a0fea09257c7fb371e29ba62fe59c3e3
                              • Instruction ID: 295d3f531d1543de5242425d577c4d1038f72dbb433a4f6d98b72d4c3ff0b89c
                              • Opcode Fuzzy Hash: f5a40e020249c264974185b8c2e82627a0fea09257c7fb371e29ba62fe59c3e3
                              • Instruction Fuzzy Hash: 0EC2C271A083A88FDB16CFA898543ECBFF1AF15310F2846E9D488BB352D6744A85CF55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AddressAllocateFreeProc
                              • String ID: "$#$'3$+$4]$9$FallbackError$J$K$L$R$Software\Microsoft\Windows Search\Tracing\EventThrottleLastReported$W$Y$]$]7IG$]7IG$^$address not available$currentContextMessage$currentContextName$fi-FI$hy-AM$invalid string position$k'$network_reset$no such file or directory$timed_out$too many links$_
                              • API String ID: 886897068-447876904
                              • Opcode ID: ce6a0ddff5a28a67766a843585afb57b93a9419ea3fe3f4c90e1a2ccdcbd98d8
                              • Instruction ID: ca39d90c5cc5feb790518548f50cd767d583fad5fced2466d20cf998a454ddc1
                              • Opcode Fuzzy Hash: ce6a0ddff5a28a67766a843585afb57b93a9419ea3fe3f4c90e1a2ccdcbd98d8
                              • Instruction Fuzzy Hash: AA03BE71D042A88FDB15CFA8D8553EDBBF1AF59300F2482EAD858B7382D7745A868F50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: %$+$/$/$0|$3.$5$5Ee%$7$9)<$B$I$NtQueryWnfStateData$Rp$S`$W$Z$^$_$currentContextMessage$failureType$hr-HR$hresult$invalid_argument$ka-GE$message$message$network_down$q$v=br
                              • API String ID: 0-64005885
                              • Opcode ID: 572d94c1cb7d473ee0cca45e166f96c2f79b6fb315ff9b95bdedd38fbc5d5d11
                              • Instruction ID: 92505f5364069a275327561e7174575c35338b9037a59fb14c38fa0d4c49abac
                              • Opcode Fuzzy Hash: 572d94c1cb7d473ee0cca45e166f96c2f79b6fb315ff9b95bdedd38fbc5d5d11
                              • Instruction Fuzzy Hash: 98E2AC71E042A89FDB15CFA8D8543EDBBF1AF4A304F1482E9D898A7342DB745A85CF40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: "$"$($(caller: %p) $4$4$6$;$CallContext:[%hs] $O$P$V$]`~-$^v$assertVersion$dbb$eD$failureType$fileName$hresult$kernelbase.dll$ky-KG$lineNumber$operation canceled$operation would block$sq$$too many files open in system$wilActivity$zfX^$}Kxg
                              • API String ID: 0-2512331295
                              • Opcode ID: 422b93bea1c7ba93eaa2d9d0bda4732153fdbd6c1122e7dddee654455b8cc7f8
                              • Instruction ID: a49448d46f2df65e54778e51f45c26c7cc5f361758b30eaedf5628c65274c578
                              • Opcode Fuzzy Hash: 422b93bea1c7ba93eaa2d9d0bda4732153fdbd6c1122e7dddee654455b8cc7f8
                              • Instruction Fuzzy Hash: E7B2C371A042A88BDB15CFA9D8913EDBBF1AF5A300F1445F9D898A7342CB354E89DF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: &$0$2$4$4Uw#$6$8$8RP"l$:H$M$N$P$R$U$Wadvapi32.dll$X$Y$address_not_available$f3$gl-ES$he-IL$it-IT$l$lb-LU$lineNumber$too many links$w#$z#
                              • API String ID: 0-3272103750
                              • Opcode ID: 8690de0d1639a0cb06e437f696bf91d8b47cd44c8fffa19eb97037d06b007a8a
                              • Instruction ID: 7b97ae3cb9288041c2ff617a48b2405823fa62d038cbf68b7b4d214e6ec078ea
                              • Opcode Fuzzy Hash: 8690de0d1639a0cb06e437f696bf91d8b47cd44c8fffa19eb97037d06b007a8a
                              • Instruction Fuzzy Hash: B9B2F271D042588EDB15DFA8D8943ECBBF1AF59300F2442EAD498BB392DB745A86CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ,-Og$1$4$API-MS-Win-Core-LocalRegistry-L1-1-0.dll$E$F$IsLowPriorityConfiguration$W$X$a$cs-CZ$e$fi-FI$h$identifier removed$iu-Latn-CA$lo-LA$message$mt-MT$nl>X$no message available$string too long$th-TH$ti-ET${r30$~
                              • API String ID: 0-764485648
                              • Opcode ID: 77e777f89b639130e64d75276fb66dd6fbe75b0fbb4986b29790d81f1174aa5d
                              • Instruction ID: 7282889e03f48cf5434036628ec668c77c4f3e833da1aa546d49e3e502f42df4
                              • Opcode Fuzzy Hash: 77e777f89b639130e64d75276fb66dd6fbe75b0fbb4986b29790d81f1174aa5d
                              • Instruction Fuzzy Hash: 2862B231A052998EDB15CFAD99947EDBFF1AF1A300F2845FAD898A7342C3748A45CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $$($+$,$-%uA$=$A$B$HostProcessExecutionStop$M$R.x6$TelemetryAssert$Windows Search Service$\@l$_$`$assertVersion$currentContextId$currentContextName$is a directory$iu-Latn-CA$jg{$operation_would_block$sr-Cyrl-CS$wilActivity
                              • API String ID: 0-871549327
                              • Opcode ID: d798f1cfa53719a577f3f3c2a0fb63beab9ce7047316c8858279dbfe08af6101
                              • Instruction ID: 7e1b751b636923a5cce8770bb85449f776bb15b51579b495a05423c8e0edd7f2
                              • Opcode Fuzzy Hash: d798f1cfa53719a577f3f3c2a0fb63beab9ce7047316c8858279dbfe08af6101
                              • Instruction Fuzzy Hash: 4FE2C171E042988FDB15CFA8D8543EDBBF1EF55305F2481EAD858AB382D7744A8A8F50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: !B8$"$&$4$9$=$HKEY_CURRENT_USER$Jm$L$T$[$[$`$already_connected$currentContextName$dtBI$eu-ES$not a socket$not enough memory$xh-ZA$zh-CHS${UnU
                              • API String ID: 0-2561934375
                              • Opcode ID: 4ff5c7b0344e8d13ed0fa86d5aa309a1272818337970648c686ef326ea0c96ca
                              • Instruction ID: 60f91fc7a260213f83ae7ebc4e076660482ed227c8df8d38630242a2613ec3d4
                              • Opcode Fuzzy Hash: 4ff5c7b0344e8d13ed0fa86d5aa309a1272818337970648c686ef326ea0c96ca
                              • Instruction Fuzzy Hash: 0372BF71E042988EDB05CFA998507EDBFF1AF59300F2886EAD898B7382D7745A45CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: )$)$.$3$5$@$G$I$J$ReturnHr$U$`$bad address$connection already in progress$connection_already_in_progress$destination address required$fileName$hresult$originatingContextName$wilActivity
                              • API String ID: 3298025750-1988273597
                              • Opcode ID: a7f5168e19cbdf52f6378e11a8f4d921733f5c4c998675601ed3a2e16bac75a2
                              • Instruction ID: 39ca65f978b800a335621e84e153053392f4c32cd5539e1e9d0c4362a265eede
                              • Opcode Fuzzy Hash: a7f5168e19cbdf52f6378e11a8f4d921733f5c4c998675601ed3a2e16bac75a2
                              • Instruction Fuzzy Hash: B282E571E042988FDB15CFA8D8913DCBBF1AF59300F6441EAE898B7382D7745A86DB10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: $$.$5$H$HostProcessExecutionStop$I$P$PQ_S$ZC$_Kt$fD4y$failureType$invalid argument$kk-KZ$ml-IN$not supported$threadId$wilActivity
                              • API String ID: 3298025750-2709668120
                              • Opcode ID: 270ffc96269439378298e555f7fef41071d8c5c896c8061a433dd79a12e6c3bd
                              • Instruction ID: b2a9b4792fb971169087c72ac7f9da348ea173d6e18592c74f85e55093ea4c0a
                              • Opcode Fuzzy Hash: 270ffc96269439378298e555f7fef41071d8c5c896c8061a433dd79a12e6c3bd
                              • Instruction Fuzzy Hash: B472CF71A042A88FDB15CFA99C942EDBBF1BF59300F1445F9E898AB342C3354A49DF64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHeapProc
                              • String ID: +$A$B$B$E$N$WSea$_$argument list too long$currentContextMessage$onecoreuap\base\appmodel\search\common\pkmutild\cregistry.cxx$rch$so-SO$sr-Latn-CS$tr-TR$|
                              • API String ID: 4280525199-3569377931
                              • Opcode ID: b280e1450768240e91a3aa363c6dd6685a36062e3737644b3075c3144d89a820
                              • Instruction ID: d0bd9ffee4d8cf92706cca182a0462b6fbe77e5aacbb11410564be523ada2bd2
                              • Opcode Fuzzy Hash: b280e1450768240e91a3aa363c6dd6685a36062e3737644b3075c3144d89a820
                              • Instruction Fuzzy Hash: 6B92EC71D042688BDB25CFA8D8857DCBBF1AF59304F1482EAE848BB382D7755A85CF10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc
                              • String ID: .$;$?$Assert$D$Q"$^$argument out of domain$bad_address$c+$hresult$not supported$originatingContextName$unknown error$wilResult$zh-CHS
                              • API String ID: 190572456-1396226173
                              • Opcode ID: 671af3ae1ee305f99aa47880fb980a7ad2a1c61e96ed78a4349427951bdce9dc
                              • Instruction ID: f042ce0bebdbdbbd54e4e104cc54a264317bd6d4571a02d7b42ce90ebee7aef8
                              • Opcode Fuzzy Hash: 671af3ae1ee305f99aa47880fb980a7ad2a1c61e96ed78a4349427951bdce9dc
                              • Instruction Fuzzy Hash: 3A62D271E042988FDB16CFA894503EDBFF1AF5A300F2942EAD895B7342D7349A46CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: "$2Av$:$:$E$J$PartA_PrivTags$Windows Search Service$`$`$bs-BA-Latn$c$currentContextMessage$ext-ms-win-advapi32-eventlog-l1-1-0$ff-Latn-NG$ig-NG
                              • API String ID: 0-1470573524
                              • Opcode ID: ad5de50db830f77e5d97ca7e5191dc97a8c1908033dfbc588042a23021d605c8
                              • Instruction ID: 5251595892132ae2cac853b422c0c7b37f7f7bdde4d3500f5824bfd7ed0d738d
                              • Opcode Fuzzy Hash: ad5de50db830f77e5d97ca7e5191dc97a8c1908033dfbc588042a23021d605c8
                              • Instruction Fuzzy Hash: 85322371E002488FEB15CFA8C8953EDBBF1EF49305F2481AAE854BB382D7755A458F54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: !A<$.Bu{failureId$4$FallbackError$HostProcessExecution$J$Q$Q$R$currentContextId$failureId$ks-Arab$l!$originatingContextName$zh-Hant
                              • API String ID: 0-1683865593
                              • Opcode ID: d481d5b5f0be82213fa0d47a6fd73b51879a2ed796ff01d9aa0ae2dcf71a5803
                              • Instruction ID: 8be679d765a50f4b76041bd23c5476becb65514075e76696f9a9f5230cbeb7da
                              • Opcode Fuzzy Hash: d481d5b5f0be82213fa0d47a6fd73b51879a2ed796ff01d9aa0ae2dcf71a5803
                              • Instruction Fuzzy Hash: 5C42CF71D083988EDB11CFA898542DCBFF1AF59310F2887AAD498B7352D7745A86CF10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHeapProc
                              • String ID: +\lU$-$=jp)$K$N$Q$W$Z$filename_too_long$message$mt-MT$onecoreuap\base\AppModel\Search\common\include\PrivateComActivationHelper.h$onecoreuap\base\appmodel\search\search\search\gather\fltrhost\fltrhost.cxx$sr-Cyrl-BA$syr-SY
                              • API String ID: 4280525199-1807326845
                              • Opcode ID: df267ba215de82252689dfd467f355aa7c112a617a2fb2eeac3bbd32eb59bbe0
                              • Instruction ID: 24892403d153c954655fbb589c01b7d8e6eb909983b20dae2dd99798843f2fdf
                              • Opcode Fuzzy Hash: df267ba215de82252689dfd467f355aa7c112a617a2fb2eeac3bbd32eb59bbe0
                              • Instruction Fuzzy Hash: DA22A071E043A88EDB16CFA998902EDBFF2BF19300F1446E9D898A7342D7744A46DF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: .\%s.mui$4$@!$B$REGISTRY$bn-IN$currentContextName$it-IT$ne-NP$result$sl-SI$sr-Cyrl-CS$wilActivity$Ye
                              • API String ID: 0-595021523
                              • Opcode ID: 3f07a0cad2e099368d959214641dddc1cf24f2aad728feb16ede9ac76e6183cc
                              • Instruction ID: 135a608a1d72934bdfb119383b25321edb2ed896c3c3907fcaa9676210050fe8
                              • Opcode Fuzzy Hash: 3f07a0cad2e099368d959214641dddc1cf24f2aad728feb16ede9ac76e6183cc
                              • Instruction Fuzzy Hash: 5D421831B052A85EEB15CFAD98903EDBFF16F1A300F5945F9D8C8A7342C6244A86CF61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ,$.$/$8$9$B$G$H$R$connection reset$hresult$originatingContextMessage$timed_out
                              • API String ID: 0-825078173
                              • Opcode ID: bf00b7885ca4b917e42f80d6cd981428a6c02680f8a49aed556f4d61e0cd9321
                              • Instruction ID: 6c4f7eda15553a5f0310b3ed662ff10a32ea015b363d6ca54d695ec5a48da9c5
                              • Opcode Fuzzy Hash: bf00b7885ca4b917e42f80d6cd981428a6c02680f8a49aed556f4d61e0cd9321
                              • Instruction Fuzzy Hash: 0DF1F371D0429A9FDB04CFA8D8403EDBBF1AF59300F2886AAD495F7281EB745B46DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: &$>$M51$P$Windows Search Service$[&>$age$bin-NG$failureId$mess$onecore\internal\sdk\inc\wil\Staging.h$rR:
                              • API String ID: 0-1572237282
                              • Opcode ID: e7ad5e290be3cb97ef83bb562d7015790a6153c3178f7b9296e85cd3bcbc528c
                              • Instruction ID: 3d313837ae14ffa5059444795d6f26ac8d226803a14b71d2586a3c55f59e474e
                              • Opcode Fuzzy Hash: e7ad5e290be3cb97ef83bb562d7015790a6153c3178f7b9296e85cd3bcbc528c
                              • Instruction Fuzzy Hash: 1DC116326083818EE314CF3994817EEFBE19FD5348F5849BEE8D897293D6748989C752
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $'$;$=$@$E$E$Jp73$L$X$d$wilActivity
                              • API String ID: 0-479315862
                              • Opcode ID: 3d333f375d1675ddb2be9ccb9a660e12b2eb796bb150b31f408809c64cb88aa0
                              • Instruction ID: 9c1b0f5615a6ca37aaf373057248e8d83b3ddea094a5ba1b512fde11277309db
                              • Opcode Fuzzy Hash: 3d333f375d1675ddb2be9ccb9a660e12b2eb796bb150b31f408809c64cb88aa0
                              • Instruction Fuzzy Hash: B091CEB1D002588FDB05CFB8D8883EDBBF1BF48304F5486A9D865B7281DB795A4A8F50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ,$8$C$H$W$Z$[$bin-NG$currentContextId$es-ES_tradnl$x
                              • API String ID: 0-9735081
                              • Opcode ID: dcd6c93db9b993f84faabac2d55ddd5d7b4cd4283f24094e8469bcb184304139
                              • Instruction ID: f26d0e378cf5686888b2e5c54e4e40635fdee7df52519562592c5a852de27c2b
                              • Opcode Fuzzy Hash: dcd6c93db9b993f84faabac2d55ddd5d7b4cd4283f24094e8469bcb184304139
                              • Instruction Fuzzy Hash: 97E1CE71D042A88EDB12CFB9E8613DDBBB1AF59304F1482A9D898B7242C7785A45CF64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: $/$=$A$$B$C$P$T$failureType
                              • API String ID: 0-3899794092
                              • Opcode ID: 1343e68bdcbe2e0bd3bff1ac6c69811b6a160aa1a5ab235a8f99c61aa20fceab
                              • Instruction ID: e9200a10051d79064be50cf3abedb732cd5853e3f912fc37dd0bb7587d3a700f
                              • Opcode Fuzzy Hash: 1343e68bdcbe2e0bd3bff1ac6c69811b6a160aa1a5ab235a8f99c61aa20fceab
                              • Instruction Fuzzy Hash: 6172B1B0D046489FDB15CFB8C8956DDBBB0EF5A318F248399D464BB382D7756A86CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$@=)$callContext$failureId$fr-FR$too_many_files_open$wrong_protocol_type
                              • API String ID: 0-3377890380
                              • Opcode ID: 461a8e977b37522e8ff12a820d9ff262e2dcb7e936a3360bfb9b6dacfdb3a979
                              • Instruction ID: d0af00adc1e272bd3713801bc04f559f39ecfab74bc9b6fdc58a0c95191fb89b
                              • Opcode Fuzzy Hash: 461a8e977b37522e8ff12a820d9ff262e2dcb7e936a3360bfb9b6dacfdb3a979
                              • Instruction Fuzzy Hash: F502AF71E092A88EDB15CFA998543EDBFF1AF15300F2485EAD888BB341C6744B85DF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: L$km-KH$onecoreuap\base\AppModel\Search\common\include\errormsg_common.hxx$sd-Deva-IN
                              • API String ID: 0-2344586223
                              • Opcode ID: e8be75062412f3a43369148b5a29453f91d85b61f6374bb98bb95e1fafbb2a53
                              • Instruction ID: ba88a88935ef2ef257de216aa880a8fcd9aa70ec35e3680ebcee2a15f7ec1d21
                              • Opcode Fuzzy Hash: e8be75062412f3a43369148b5a29453f91d85b61f6374bb98bb95e1fafbb2a53
                              • Instruction Fuzzy Hash: 13514831A042A84ECB158FEDA8903ED7FF16F19311F5941FADCCCA3392C524898ACB64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: b$sr-Latn-BA$sv-SE
                              • API String ID: 0-3733230230
                              • Opcode ID: 610d52f40366b2a1cda8ee6a4dac7a5dcbacf2207d7057c760cc79995142f303
                              • Instruction ID: 13d4de92b6cedbc592316461979d018f2384a1b271f133974c718a3ccebf22e9
                              • Opcode Fuzzy Hash: 610d52f40366b2a1cda8ee6a4dac7a5dcbacf2207d7057c760cc79995142f303
                              • Instruction Fuzzy Hash: 8D51C632A042AC4EDB51CFADA8903EDBFE16F55300F1945FAD8DCA7352D9644986CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d2e543f0822827d83de87c2735d291301b8330a8a321558d2fcc5cac76a72197
                              • Instruction ID: f348ad01077707f187ca1fdc8b1458d16e70365141b2014a633e893796d7c1a7
                              • Opcode Fuzzy Hash: d2e543f0822827d83de87c2735d291301b8330a8a321558d2fcc5cac76a72197
                              • Instruction Fuzzy Hash: ECE0ECB1904708AFDB18CF8AD44189AFBF8EE48360B10C46EE05AE3300D270AD408B50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
                              • Instruction ID: 01513cdb45ce42654985ae443ff07ed2023d2f9c2cc80418f216d1c85a703bac
                              • Opcode Fuzzy Hash: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
                              • Instruction Fuzzy Hash: ECC00139661A40CFCA55CF08C194E00B3F4FB5D760B068491E906CB732C234ED40DA40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2893816873.0000000000B10000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_b10000_SearchProtocolHost.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fb1dcb45eca10bbd415de50d8dac458e7e42156cf4c282332bc7bc400f2a61b4
                              • Instruction ID: 09a661d3bcde169e3a68bda8983e2d082d1c510c2daa6ab026a58b72df35bac7
                              • Opcode Fuzzy Hash: fb1dcb45eca10bbd415de50d8dac458e7e42156cf4c282332bc7bc400f2a61b4
                              • Instruction Fuzzy Hash: 3AA00235692980CFCE16CF08C290F0073B4F754B40F010490E401C7A21C228ED40C940
                              Uniqueness

                              Uniqueness Score: -1.00%