Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OmPnD1qvad.exe

Overview

General Information

Sample Name:OmPnD1qvad.exe
Original Sample Name:302b13223db8c63367c43b004b9395d8.exe
Analysis ID:894060
MD5:302b13223db8c63367c43b004b9395d8
SHA1:2fda947fb80d0089f41fef46137b52bab9b9845e
SHA256:9802c511f650d5eb611d309889655ac2f8daab5f87c30463b2505da99076192b
Tags:exe
Infos:

Detection

Redline Clipper
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Redline Clipper
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for dropped file
Sigma detected: Schedule system process
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Drops PE files with benign system names
Injects a PE file into a foreign processes
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Drops PE files
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Creates a window with clipboard capturing capabilities
Contains functionality to launch a process as a different user
Sample execution stops while process was sleeping (likely an evasion)
Creates a process in suspended mode (likely to inject code)
Contains long sleeps (>= 3 min)

Classification

  • System is w10x64
  • OmPnD1qvad.exe (PID: 6544 cmdline: C:\Users\user\Desktop\OmPnD1qvad.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • OmPnD1qvad.exe (PID: 5920 cmdline: C:\Users\user\Desktop\OmPnD1qvad.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • cmd.exe (PID: 5876 cmdline: cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6768 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6724 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 6864 cmdline: cmd.exe" /C copy "C:\Users\user\Desktop\OmPnD1qvad.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 6828 cmdline: C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • svchost.exe (PID: 6936 cmdline: C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • cmd.exe (PID: 6932 cmdline: cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 4708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 7028 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 7128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5388 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 5408 cmdline: cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 3176 cmdline: C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • svchost.exe (PID: 6892 cmdline: C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • cmd.exe (PID: 6908 cmdline: cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6980 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 7116 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 7160 cmdline: cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 2376 cmdline: C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • svchost.exe (PID: 5820 cmdline: C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: 302B13223DB8C63367C43B004B9395D8)
    • cmd.exe (PID: 6740 cmdline: cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 7040 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5068 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 2588 cmdline: cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Wallet Addresses": ["0xe83e13519074b66ED4fEa23Bf8B18402417504cf", "DFHGrZZVdeJioKHuMtJsT8BjRa7JACkJ8x", "LQ3N47jbUeN1ncAxjL2bQxdbfrTv6DQEwq", "XwPYYFb9s2fCKgZdRJTSLkGy79rNXRnSqM", "46iBmeV6Z5VFEi6q4iGT8A7nzuxwA3AHsZajPsLEbHhFhDEs1SAk3jWWiNdn5CWRHxdsnqvEomjGT3pECWB7BTpsPGEi6Yu"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.480610988.00000000024A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedlineClipperYara detected Redline ClipperJoe Security
    00000009.00000002.488605181.0000000003371000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedlineClipperYara detected Redline ClipperJoe Security
      Process Memory Space: OmPnD1qvad.exe PID: 6544JoeSecurity_RedlineClipperYara detected Redline ClipperJoe Security
        Process Memory Space: svchost.exe PID: 6828JoeSecurity_RedlineClipperYara detected Redline ClipperJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.OmPnD1qvad.exe.24cfe38.0.raw.unpackJoeSecurity_RedlineClipperYara detected Redline ClipperJoe Security
            9.2.svchost.exe.339ff34.0.raw.unpackJoeSecurity_RedlineClipperYara detected Redline ClipperJoe Security

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f, CommandLine: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\user\Desktop\OmPnD1qvad.exe, ParentImage: C:\Users\user\Desktop\OmPnD1qvad.exe, ParentProcessId: 6544, ParentProcessName: OmPnD1qvad.exe, ProcessCommandLine: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f, ProcessId: 6768, ProcessName: cmd.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0.2.OmPnD1qvad.exe.24cfe38.0.raw.unpackMalware Configuration Extractor: Redline Clipper {"Wallet Addresses": ["0xe83e13519074b66ED4fEa23Bf8B18402417504cf", "DFHGrZZVdeJioKHuMtJsT8BjRa7JACkJ8x", "LQ3N47jbUeN1ncAxjL2bQxdbfrTv6DQEwq", "XwPYYFb9s2fCKgZdRJTSLkGy79rNXRnSqM", "46iBmeV6Z5VFEi6q4iGT8A7nzuxwA3AHsZajPsLEbHhFhDEs1SAk3jWWiNdn5CWRHxdsnqvEomjGT3pECWB7BTpsPGEi6Yu"]}
              Source: OmPnD1qvad.exeReversingLabs: Detection: 59%
              Source: OmPnD1qvad.exeVirustotal: Detection: 64%Perma Link
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeReversingLabs: Detection: 59%
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeVirustotal: Detection: 64%Perma Link
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeJoe Sandbox ML: detected
              Source: OmPnD1qvad.exeJoe Sandbox ML: detected
              Source: OmPnD1qvad.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: OmPnD1qvad.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: OmPnD1qvad.exe, 00000000.00000002.479946399.00000000005FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeWindow created: window name: CLIPBRDWNDCLASS
              Source: OmPnD1qvad.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: OmPnD1qvad.exe, 00000000.00000002.480610988.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCrack Redline.exe4 vs OmPnD1qvad.exe
              Source: OmPnD1qvad.exe, 00000000.00000000.474804324.00000000000CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBvSsh.exe vs OmPnD1qvad.exe
              Source: OmPnD1qvad.exe, 00000000.00000002.479946399.00000000005FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs OmPnD1qvad.exe
              Source: OmPnD1qvad.exe, 00000001.00000002.742889499.0000000001489000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs OmPnD1qvad.exe
              Source: OmPnD1qvad.exe, 00000001.00000002.744703347.0000000005858000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs OmPnD1qvad.exe
              Source: OmPnD1qvad.exeBinary or memory string: OriginalFilenameBvSsh.exe vs OmPnD1qvad.exe
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeCode function: 0_2_022E1AB40_2_022E1AB4
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeCode function: 1_2_016EF9B21_2_016EF9B2
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeCode function: 1_2_016EB6341_2_016EB634
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeCode function: 1_2_016EDEE01_2_016EDEE0
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeCode function: 1_2_016EDED01_2_016EDED0
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 10_2_05C5F95010_2_05C5F950
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 10_2_05C5B63410_2_05C5B634
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 10_2_05C5DEDF10_2_05C5DEDF
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 10_2_05C5DEE010_2_05C5DEE0
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05B2D4B419_2_05B2D4B4
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05B2D4A819_2_05B2D4A8
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05B2B63419_2_05B2B634
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05B2DEE019_2_05B2DEE0
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05B2DED019_2_05B2DED0
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05B2F95019_2_05B2F950
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05BFD19819_2_05BFD198
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05BF5CE819_2_05BF5CE8
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05BF6D8719_2_05BF6D87
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeCode function: 0_2_022E5D00 CreateProcessAsUserA,0_2_022E5D00
              Source: OmPnD1qvad.exeReversingLabs: Detection: 59%
              Source: OmPnD1qvad.exeVirustotal: Detection: 64%
              Source: OmPnD1qvad.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: OmPnD1qvad.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\OmPnD1qvad.exe C:\Users\user\Desktop\OmPnD1qvad.exe
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Users\user\Desktop\OmPnD1qvad.exe C:\Users\user\Desktop\OmPnD1qvad.exe
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\OmPnD1qvad.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Users\user\Desktop\OmPnD1qvad.exe C:\Users\user\Desktop\OmPnD1qvad.exeJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\OmPnD1qvad.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3676:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4708:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6732:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5852:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7128:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6068:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3484:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6756:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6760:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6844:120:WilError_01
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeFile created: C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: classification engineClassification label: mal100.spyw.evad.winEXE@56/4@0/0
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: OmPnD1qvad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: OmPnD1qvad.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05BFAE90 push 00000004h; ret 19_2_05BFAEA6
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05BF9ACF push ecx; ret 19_2_05BF9AD5
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeCode function: 19_2_05BF9AC1 push ecx; ret 19_2_05BF9AD5
              Source: initial sampleStatic PE information: section name: .text entropy: 7.661351728887682
              Source: initial sampleStatic PE information: section name: .text entropy: 7.661351728887682

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exe TID: 6516Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exe TID: 5912Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exe TID: 6816Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exe TID: 6940Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exe TID: 3216Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exe TID: 7144Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exe TID: 1084Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exe TID: 1332Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeThread delayed: delay time: 30000Jump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 30000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 30000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 30000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeMemory written: C:\Users\user\Desktop\OmPnD1qvad.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeMemory written: C:\Users\user\AppData\Roaming\svchost\svchost.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeMemory written: C:\Users\user\AppData\Roaming\svchost\svchost.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeMemory written: C:\Users\user\AppData\Roaming\svchost\svchost.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Users\user\Desktop\OmPnD1qvad.exe C:\Users\user\Desktop\OmPnD1qvad.exeJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\OmPnD1qvad.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Users\user\AppData\Roaming\svchost\svchost.exe C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeQueries volume information: C:\Users\user\Desktop\OmPnD1qvad.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeQueries volume information: C:\Users\user\Desktop\OmPnD1qvad.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost\svchost.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\OmPnD1qvad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.OmPnD1qvad.exe.24cfe38.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.svchost.exe.339ff34.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.480610988.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.488605181.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: OmPnD1qvad.exe PID: 6544, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6828, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              1
              Valid Accounts
              1
              Scheduled Task/Job
              1
              Valid Accounts
              1
              Valid Accounts
              11
              Masquerading
              1
              Input Capture
              1
              Security Software Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/Job1
              Scheduled Task/Job
              1
              Access Token Manipulation
              1
              Valid Accounts
              LSASS Memory21
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)111
              Process Injection
              1
              Access Token Manipulation
              Security Account Manager12
              System Information Discovery
              SMB/Windows Admin Shares1
              Clipboard Data
              Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)1
              Scheduled Task/Job
              1
              Disable or Modify Tools
              NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
              Virtualization/Sandbox Evasion
              LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common111
              Process Injection
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items2
              Obfuscated Files or Information
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              Software Packing
              Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 894060 Sample: OmPnD1qvad.exe Startdate: 25/06/2023 Architecture: WINDOWS Score: 100 65 Found malware configuration 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 Yara detected Redline Clipper 2->69 71 2 other signatures 2->71 7 OmPnD1qvad.exe 2 2->7         started        11 svchost.exe 1 2->11         started        13 svchost.exe 2->13         started        15 svchost.exe 2->15         started        process3 file4 59 C:\Users\user\AppData\...\OmPnD1qvad.exe.log, ASCII 7->59 dropped 73 Injects a PE file into a foreign processes 7->73 17 cmd.exe 2 7->17         started        20 cmd.exe 3 7->20         started        23 cmd.exe 1 7->23         started        25 OmPnD1qvad.exe 2 7->25         started        75 Multi AV Scanner detection for dropped file 11->75 77 Machine Learning detection for dropped file 11->77 27 cmd.exe 11->27         started        31 3 other processes 11->31 33 4 other processes 13->33 29 cmd.exe 1 15->29         started        35 3 other processes 15->35 signatures5 process6 file7 61 Uses schtasks.exe or at.exe to add and modify task schedules 17->61 63 Drops PE files with benign system names 17->63 37 conhost.exe 17->37         started        55 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 20->55 dropped 57 C:\Users\user\...\svchost.exe:Zone.Identifier, ASCII 20->57 dropped 39 conhost.exe 20->39         started        41 conhost.exe 23->41         started        43 schtasks.exe 1 23->43         started        45 2 other processes 27->45 47 2 other processes 29->47 49 2 other processes 31->49 51 4 other processes 33->51 53 2 other processes 35->53 signatures8 process9

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              OmPnD1qvad.exe59%ReversingLabsByteCode-MSIL.Trojan.ClipBanker
              OmPnD1qvad.exe65%VirustotalBrowse
              OmPnD1qvad.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\svchost\svchost.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\svchost\svchost.exe59%ReversingLabsByteCode-MSIL.Trojan.ClipBanker
              C:\Users\user\AppData\Roaming\svchost\svchost.exe65%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              No contacted IP infos
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:894060
              Start date and time:2023-06-25 09:56:55 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 10m 7s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:37
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:OmPnD1qvad.exe
              Original Sample Name:302b13223db8c63367c43b004b9395d8.exe
              Detection:MAL
              Classification:mal100.spyw.evad.winEXE@56/4@0/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 94
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): WMIADAP.exe
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing behavior information.
              TimeTypeDescription
              09:57:52API Interceptor1x Sleep call for process: OmPnD1qvad.exe modified
              09:57:56Task SchedulerRun new task: Nafifas path: "C:\Users\user\AppData\Roaming\svchost\svchost.exe"
              09:57:56API Interceptor3x Sleep call for process: svchost.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\OmPnD1qvad.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):520
              Entropy (8bit):5.345981753770044
              Encrypted:false
              SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:MLUE4K5E4Ks2wKDE4KhK3VZ9pKhk
              MD5:044A637E42FE9A819D7E43C8504CA769
              SHA1:6FCA27B1A571B73563C8424C84F4F64F3CBCBE2F
              SHA-256:E88E04654826CE00CC7A840745254164DDBD175066D6E4EA6858BF0FE463EBB4
              SHA-512:C9A74FA4154FA5E5951B0EEAC5330CA4BAC981FF9AD24C08575A76AD5D99CFB68556B9857C9C8209A1BFCB43F82E00F14962987A18A92A715F45AD0D4E4A718C
              Malicious:true
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
              Process:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):520
              Entropy (8bit):5.345981753770044
              Encrypted:false
              SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:MLUE4K5E4Ks2wKDE4KhK3VZ9pKhk
              MD5:044A637E42FE9A819D7E43C8504CA769
              SHA1:6FCA27B1A571B73563C8424C84F4F64F3CBCBE2F
              SHA-256:E88E04654826CE00CC7A840745254164DDBD175066D6E4EA6858BF0FE463EBB4
              SHA-512:C9A74FA4154FA5E5951B0EEAC5330CA4BAC981FF9AD24C08575A76AD5D99CFB68556B9857C9C8209A1BFCB43F82E00F14962987A18A92A715F45AD0D4E4A718C
              Malicious:false
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
              Process:C:\Windows\SysWOW64\cmd.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):300544
              Entropy (8bit):6.28995420993401
              Encrypted:false
              SSDEEP:6144:Srbm6QnkktV535ZLLnvv2+EBEFMAA55555A5555555A5555555555ti:5nkktV535ZLLnvGp
              MD5:302B13223DB8C63367C43B004B9395D8
              SHA1:2FDA947FB80D0089F41FEF46137B52BAB9B9845E
              SHA-256:9802C511F650D5EB611D309889655AC2F8DAAB5F87C30463B2505DA99076192B
              SHA-512:AEFEB350ED922BCF127D299D091CF0F7CD6E2BF78D5FC19847386E4AE7117FD2B8832513064F9E08D9BD6EBD508E836B79995D1C939316B1408F292F01C693FE
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 59%
              • Antivirus: Virustotal, Detection: 65%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....d............................(.... ........@.. ....................................@.....................................J.......0............................................................................ ............... ..H............text........ ...................... ..`.rsrc...0...........................@..@.reloc..............................@..B........................H........F...G..............F8...........................................0..S.......~)...8....8....~*...~.....?8....8....8....~+...8....8....8....8....~-...~,...~.....\(m..........(....(....~*...~.....}(m...(}....~+.....(......~-...~,...~.... ....(m..........(....(....~*...~.... ....(m...(}....~+.....(......~-...~,...~.... ....(m..........(....(....*(z...8.....8....(m...8....(}...8.....8.....8.....8....(....8......8......0..9.......8....8....~/...8......9...~.... ....8....8..
              Process:C:\Windows\SysWOW64\cmd.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):6.28995420993401
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:OmPnD1qvad.exe
              File size:300544
              MD5:302b13223db8c63367c43b004b9395d8
              SHA1:2fda947fb80d0089f41fef46137b52bab9b9845e
              SHA256:9802c511f650d5eb611d309889655ac2f8daab5f87c30463b2505da99076192b
              SHA512:aefeb350ed922bcf127d299d091cf0f7cd6e2bf78d5fc19847386e4ae7117fd2b8832513064f9e08d9bd6ebd508e836b79995d1c939316b1408f292f01c693fe
              SSDEEP:6144:Srbm6QnkktV535ZLLnvv2+EBEFMAA55555A5555555A5555555555ti:5nkktV535ZLLnvGp
              TLSH:73541D770EAE6CACD8AECEF026A601265D9ACF16BCB0C25B1D51B08145FC940779ECD7
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d............................(.... ........@.. ....................................@................................
              Icon Hash:8e9693b32baf9e98
              Entrypoint:0x41c728
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x6495DEB4 [Fri Jun 23 18:04:36 2023 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1c6de0x4a.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e0000x2e830.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x1a72e0x1a800False0.4202903891509434data7.661351728887682IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x1e0000x2e8300x2ea00False0.1320794235924933data4.904497737371291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x4e0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x1e0ac0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.04819294924878741
              RT_ICON0x2e8f80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.14486546142526802
              RT_ICON0x37dc40x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 265600.16924812030075187
              RT_ICON0x3e5d00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.1961645101663586
              RT_ICON0x43a7c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.12801133679735474
              RT_ICON0x47cc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.2567427385892116
              RT_ICON0x4a2940x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.2980769230769231
              RT_ICON0x4b3600x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.41762295081967216
              RT_ICON0x4bd0c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.549645390070922
              RT_GROUP_ICON0x4c1c20x84data0.7272727272727273
              RT_VERSION0x4c2820x388data0.4491150442477876
              RT_MANIFEST0x4c6460x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
              DLLImport
              mscoree.dll_CorExeMain
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:09:57:52
              Start date:25/06/2023
              Path:C:\Users\user\Desktop\OmPnD1qvad.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\OmPnD1qvad.exe
              Imagebase:0xb0000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_RedlineClipper, Description: Yara detected Redline Clipper, Source: 00000000.00000002.480610988.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low

              Target ID:1
              Start time:09:57:53
              Start date:25/06/2023
              Path:C:\Users\user\Desktop\OmPnD1qvad.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\OmPnD1qvad.exe
              Imagebase:0xe50000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Reputation:low

              Target ID:2
              Start time:09:57:53
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:3
              Start time:09:57:53
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:4
              Start time:09:57:54
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:5
              Start time:09:57:54
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:09:57:54
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x870000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:7
              Start time:09:57:54
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C copy "C:\Users\user\Desktop\OmPnD1qvad.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:8
              Start time:09:57:54
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:9
              Start time:09:57:56
              Start date:25/06/2023
              Path:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0xc00000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_RedlineClipper, Description: Yara detected Redline Clipper, Source: 00000009.00000002.488605181.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 59%, ReversingLabs
              • Detection: 65%, Virustotal, Browse

              Target ID:10
              Start time:09:57:56
              Start date:25/06/2023
              Path:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0xfb0000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET

              Target ID:11
              Start time:09:57:57
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:12
              Start time:09:57:57
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:13
              Start time:09:57:57
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:14
              Start time:09:57:57
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:15
              Start time:09:57:57
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x870000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:16
              Start time:09:57:58
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:17
              Start time:09:57:58
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:18
              Start time:09:58:01
              Start date:25/06/2023
              Path:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0x260000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET

              Target ID:19
              Start time:09:58:02
              Start date:25/06/2023
              Path:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0xe80000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET

              Target ID:20
              Start time:09:58:02
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:21
              Start time:09:58:02
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:22
              Start time:09:58:02
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:23
              Start time:09:58:02
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:24
              Start time:09:58:02
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x870000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:25
              Start time:09:58:03
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:26
              Start time:09:58:03
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:28
              Start time:09:59:00
              Start date:25/06/2023
              Path:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0x1f0000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET

              Target ID:29
              Start time:09:59:01
              Start date:25/06/2023
              Path:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0x470000
              File size:300544 bytes
              MD5 hash:302B13223DB8C63367C43B004B9395D8
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET

              Target ID:30
              Start time:09:59:01
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C mkdir "C:\Users\user\AppData\Roaming\svchost
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:31
              Start time:09:59:01
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:32
              Start time:09:59:03
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:33
              Start time:09:59:04
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:34
              Start time:09:59:04
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
              Imagebase:0x870000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:35
              Start time:09:59:04
              Start date:25/06/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe" /C copy "C:\Users\user\AppData\Roaming\svchost\svchost.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
              Imagebase:0x1b0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Target ID:36
              Start time:09:59:04
              Start date:25/06/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6da640000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language

              Reset < >

                Execution Graph

                Execution Coverage:24.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:10.5%
                Total number of Nodes:76
                Total number of Limit Nodes:5
                execution_graph 4808 22e0448 4809 22e044e 4808->4809 4810 22e0452 4809->4810 4812 22e22b4 4809->4812 4814 22e22cf 4812->4814 4813 22e22dc 4813->4810 4817 22e3db0 4814->4817 4821 22e3da0 4814->4821 4819 22e3dbc 4817->4819 4818 22e3dc6 4818->4813 4819->4818 4825 22e5638 4819->4825 4823 22e3db0 4821->4823 4822 22e3dc6 4822->4813 4823->4822 4824 22e5638 14 API calls 4823->4824 4824->4823 4826 22e5648 4825->4826 4827 22e56e9 4826->4827 4857 22e5cf4 4826->4857 4862 22e5d00 4826->4862 4834 22e59df 4827->4834 4866 22e61f0 4827->4866 4872 22e61f8 4827->4872 4828 22e5a38 4893 22e64c8 4828->4893 4896 22e64c0 4828->4896 4829 22e5a60 4829->4819 4830 22e57ce 4875 22e62e0 4830->4875 4880 22e62e8 4830->4880 4883 22e6388 4830->4883 4831 22e584a 4831->4834 4851 22e6388 2 API calls 4831->4851 4889 22e6390 4831->4889 4832 22e58b7 4833 22e59a1 4832->4833 4846 22e6388 2 API calls 4832->4846 4847 22e6390 WriteProcessMemory 4832->4847 4853 22e6388 2 API calls 4833->4853 4854 22e6390 WriteProcessMemory 4833->4854 4835 22e5a1b 4834->4835 4840 22e61f0 2 API calls 4834->4840 4901 22e6138 4834->4901 4905 22e6136 4834->4905 4835->4828 4848 22e6138 SetThreadContext 4835->4848 4849 22e6136 SetThreadContext 4835->4849 4850 22e61f0 2 API calls 4835->4850 4840->4835 4846->4832 4847->4832 4848->4828 4849->4828 4850->4828 4851->4832 4853->4834 4854->4834 4858 22e5cff CreateProcessAsUserA 4857->4858 4859 22e5c97 4857->4859 4861 22e5fa8 4858->4861 4859->4827 4863 22e5d8d CreateProcessAsUserA 4862->4863 4865 22e5fa8 4863->4865 4867 22e618f SetThreadContext 4866->4867 4868 22e61f7 ReadProcessMemory 4866->4868 4869 22e61be 4867->4869 4871 22e627d 4868->4871 4869->4830 4871->4830 4873 22e6240 ReadProcessMemory 4872->4873 4874 22e627d 4873->4874 4874->4830 4876 22e627f 4875->4876 4877 22e62e7 VirtualAllocEx 4875->4877 4876->4831 4879 22e6362 4877->4879 4879->4831 4881 22e632b VirtualAllocEx 4880->4881 4882 22e6362 4881->4882 4882->4831 4884 22e638f WriteProcessMemory 4883->4884 4885 22e6327 VirtualAllocEx 4883->4885 4888 22e642c 4884->4888 4887 22e6362 4885->4887 4887->4831 4888->4831 4890 22e63db WriteProcessMemory 4889->4890 4892 22e642c 4890->4892 4892->4832 4894 22e6509 ResumeThread 4893->4894 4895 22e6536 4894->4895 4895->4829 4897 22e64c7 ResumeThread 4896->4897 4899 22e645f 4896->4899 4900 22e6536 4897->4900 4899->4829 4900->4829 4902 22e6180 SetThreadContext 4901->4902 4904 22e61be 4902->4904 4904->4835 4906 22e6180 SetThreadContext 4905->4906 4908 22e61be 4906->4908 4908->4835

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 74 22e6388-22e638d 75 22e638f-22e63e1 74->75 76 22e6327-22e6360 VirtualAllocEx 74->76 80 22e63e3-22e63ef 75->80 81 22e63f1-22e642a WriteProcessMemory 75->81 77 22e6369-22e637d 76->77 78 22e6362-22e6368 76->78 78->77 80->81 83 22e642c-22e6432 81->83 84 22e6433-22e6454 81->84 83->84
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 022E6353
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 022E641D
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: AllocMemoryProcessVirtualWrite
                • String ID:
                • API String ID: 645232735-0
                • Opcode ID: aa139c06dc1079bf833871ac0eadbaf8740cd5b88dc9a67c7ccd6bec0888d8f8
                • Instruction ID: 7a929c7bf0644aa9d3577e88c8d7702b75f320a2a380ec1d5f18b5d1b824af86
                • Opcode Fuzzy Hash: aa139c06dc1079bf833871ac0eadbaf8740cd5b88dc9a67c7ccd6bec0888d8f8
                • Instruction Fuzzy Hash: CC4147B1900249DFCF10CF9AD884BEEBBF5FF48314F508429E919A7250C378A545DBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 147 22e5d00-22e5d99 149 22e5ded-22e5e0f 147->149 150 22e5d9b-22e5dc0 147->150 153 22e5e66-22e5e96 149->153 154 22e5e11-22e5e39 149->154 150->149 155 22e5dc2-22e5dc4 150->155 164 22e5eea-22e5fa6 CreateProcessAsUserA 153->164 165 22e5e98-22e5ebd 153->165 154->153 162 22e5e3b-22e5e3d 154->162 156 22e5dc6-22e5dd0 155->156 157 22e5de7-22e5dea 155->157 159 22e5dd4-22e5de3 156->159 160 22e5dd2 156->160 157->149 159->159 163 22e5de5 159->163 160->159 166 22e5e3f-22e5e49 162->166 167 22e5e60-22e5e63 162->167 163->157 179 22e5faf-22e6023 164->179 180 22e5fa8-22e5fae 164->180 165->164 172 22e5ebf-22e5ec1 165->172 169 22e5e4d-22e5e5c 166->169 170 22e5e4b 166->170 167->153 169->169 173 22e5e5e 169->173 170->169 174 22e5ee4-22e5ee7 172->174 175 22e5ec3-22e5ecd 172->175 173->167 174->164 177 22e5ecf 175->177 178 22e5ed1-22e5ee0 175->178 177->178 178->178 181 22e5ee2 178->181 189 22e6025-22e6029 179->189 190 22e6033-22e6037 179->190 180->179 181->174 189->190 191 22e602b 189->191 192 22e6039-22e603d 190->192 193 22e6047-22e604b 190->193 191->190 192->193 196 22e603f 192->196 194 22e604d-22e6051 193->194 195 22e605b-22e605f 193->195 194->195 197 22e6053 194->197 198 22e6071-22e6078 195->198 199 22e6061-22e6067 195->199 196->193 197->195 200 22e608f 198->200 201 22e607a-22e6089 198->201 199->198 203 22e6090 200->203 201->200 203->203
                APIs
                • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 022E5F93
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: CreateProcessUser
                • String ID:
                • API String ID: 2217836671-0
                • Opcode ID: d1c194d61439a0d97b03197539b3b53540792aeb1e3b9891c02c9bab6404e3a4
                • Instruction ID: 2568614d9d079f7efded18ea0d72495f5da10673cd4c1f74eb4a7b243a0e82dc
                • Opcode Fuzzy Hash: d1c194d61439a0d97b03197539b3b53540792aeb1e3b9891c02c9bab6404e3a4
                • Instruction Fuzzy Hash: 9CA17971E102198FDF10CFA8C8817EDBBB6FF48308F4481A9E819A7294DB749985DF91
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: adc7dc5b214255ea454821aad56aebbb741c14111c1904f0045ff924f0d80b11
                • Instruction ID: d15c74c13af73de9e56f1593cbbf42cdb286e55b9d4f4ac80e1df166197b314a
                • Opcode Fuzzy Hash: adc7dc5b214255ea454821aad56aebbb741c14111c1904f0045ff924f0d80b11
                • Instruction Fuzzy Hash: 96C15D1141F3C15ECB037BBCD4755DA7FA28D2B168B8D08E3C0C69E5A7D428489EE3A6
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 22e5cf4-22e5cfd 1 22e5cff-22e5d99 0->1 2 22e5c97-22e5cab 0->2 8 22e5ded-22e5e0f 1->8 9 22e5d9b-22e5dc0 1->9 3 22e5cad-22e5cb0 2->3 4 22e5cb1-22e5cb9 call 22e27f0 2->4 4->3 12 22e5e66-22e5e96 8->12 13 22e5e11-22e5e39 8->13 9->8 14 22e5dc2-22e5dc4 9->14 23 22e5eea-22e5fa6 CreateProcessAsUserA 12->23 24 22e5e98-22e5ebd 12->24 13->12 21 22e5e3b-22e5e3d 13->21 15 22e5dc6-22e5dd0 14->15 16 22e5de7-22e5dea 14->16 18 22e5dd4-22e5de3 15->18 19 22e5dd2 15->19 16->8 18->18 22 22e5de5 18->22 19->18 25 22e5e3f-22e5e49 21->25 26 22e5e60-22e5e63 21->26 22->16 38 22e5faf-22e6023 23->38 39 22e5fa8-22e5fae 23->39 24->23 31 22e5ebf-22e5ec1 24->31 28 22e5e4d-22e5e5c 25->28 29 22e5e4b 25->29 26->12 28->28 32 22e5e5e 28->32 29->28 33 22e5ee4-22e5ee7 31->33 34 22e5ec3-22e5ecd 31->34 32->26 33->23 36 22e5ecf 34->36 37 22e5ed1-22e5ee0 34->37 36->37 37->37 40 22e5ee2 37->40 48 22e6025-22e6029 38->48 49 22e6033-22e6037 38->49 39->38 40->33 48->49 50 22e602b 48->50 51 22e6039-22e603d 49->51 52 22e6047-22e604b 49->52 50->49 51->52 55 22e603f 51->55 53 22e604d-22e6051 52->53 54 22e605b-22e605f 52->54 53->54 56 22e6053 53->56 57 22e6071-22e6078 54->57 58 22e6061-22e6067 54->58 55->52 56->54 59 22e608f 57->59 60 22e607a-22e6089 57->60 58->57 62 22e6090 59->62 60->59 62->62
                APIs
                • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 022E5F93
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: CreateProcessUser
                • String ID: _
                • API String ID: 2217836671-701932520
                • Opcode ID: 022cde8e6b450f371b28bc6c890c8cc4c93be7f60f96a18b76acb780bdfc18e4
                • Instruction ID: 249d3f53f68524796fd330b7feeb772d6cac9546820e32e0bfc283bdbe46d4f6
                • Opcode Fuzzy Hash: 022cde8e6b450f371b28bc6c890c8cc4c93be7f60f96a18b76acb780bdfc18e4
                • Instruction Fuzzy Hash: 6EB18B70D202198FDF10CFA8C8817EDBBB6FF48308F4481A9E81AA7255DB749985DF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 63 22e64c0-22e64c5 64 22e645f-22e6473 63->64 65 22e64c7-22e6534 ResumeThread 63->65 66 22e6479-22e6481 call 22e27f0 64->66 67 22e6475-22e6478 64->67 70 22e653d-22e6551 65->70 71 22e6536-22e653c 65->71 66->67 71->70
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID: d
                • API String ID: 947044025-2564639436
                • Opcode ID: e043ed42af3697990cbbec5df1dbdd61601d1b00a673abc09140202a87d64540
                • Instruction ID: 12dd71f6196d3bfdf613ca0eaabff84833ddc7cfab7cf4534a62a78021b254b6
                • Opcode Fuzzy Hash: e043ed42af3697990cbbec5df1dbdd61601d1b00a673abc09140202a87d64540
                • Instruction Fuzzy Hash: EF2188B1904208CFCB20CF9AD4847EEBFF8EB48310F10805AD51AA7304D7746A45DBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 86 22e61f0-22e61f5 87 22e618f-22e61bc SetThreadContext 86->87 88 22e61f7-22e627b ReadProcessMemory 86->88 89 22e61be-22e61c4 87->89 90 22e61c5-22e61e6 87->90 92 22e627d-22e6283 88->92 93 22e6284-22e62a5 88->93 89->90 92->93
                APIs
                • SetThreadContext.KERNELBASE(?,00000000), ref: 022E61AF
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 022E626E
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: ContextMemoryProcessReadThread
                • String ID:
                • API String ID: 1264303914-0
                • Opcode ID: 6564d6245724f7b187cb8b8d072293cc2ccaa4a853cfd24927c6d6e65c3a7346
                • Instruction ID: b67e7809162781b512a8d619d3cd94b30cae329383c4d193e367ff200d915fee
                • Opcode Fuzzy Hash: 6564d6245724f7b187cb8b8d072293cc2ccaa4a853cfd24927c6d6e65c3a7346
                • Instruction Fuzzy Hash: AC3114B29002099FDB10CF9AC884BEEBBF8EB48324F548069E458A7251D378A555DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 204 22e62e0-22e62e5 205 22e627f-22e62a5 204->205 206 22e62e7-22e6360 VirtualAllocEx 204->206 208 22e6369-22e637d 206->208 209 22e6362-22e6368 206->209 209->208
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 022E6353
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: ea6404922fc0e6656e6552ba4d8e04088ad946454fd223780234b682ea7852b3
                • Instruction ID: 76bb0e123282b062963138433611136a035223ee05c932d3c292a25bdcf1337c
                • Opcode Fuzzy Hash: ea6404922fc0e6656e6552ba4d8e04088ad946454fd223780234b682ea7852b3
                • Instruction Fuzzy Hash: DB2175B69002099FCF20CF9AD844AEEBBF4FF98324F14805AE568A7241C334A545CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 211 22e6390-22e63e1 213 22e63e3-22e63ef 211->213 214 22e63f1-22e642a WriteProcessMemory 211->214 213->214 215 22e642c-22e6432 214->215 216 22e6433-22e6454 214->216 215->216
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 022E641D
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 7ff77ae4bb6c5e28ead868755275a95dd633cb1debc9af2f59b7881752fd469c
                • Instruction ID: ef6467e53fff6adc947624ea4498ff0d5cd3860c23fe1199bfda6c68e1fd046d
                • Opcode Fuzzy Hash: 7ff77ae4bb6c5e28ead868755275a95dd633cb1debc9af2f59b7881752fd469c
                • Instruction Fuzzy Hash: 7521E5B19102599FCF10CF9AD884BDEBBF4FF48314F50842AE959A7350D778A944DBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 218 22e6136-22e6184 220 22e6186-22e618e 218->220 221 22e6190-22e61bc SetThreadContext 218->221 220->221 222 22e61be-22e61c4 221->222 223 22e61c5-22e61e6 221->223 222->223
                APIs
                • SetThreadContext.KERNELBASE(?,00000000), ref: 022E61AF
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: d62a3c84492237c2e812364e2bcf7333d78d65b57f459d89bc87ed871bb9d6f7
                • Instruction ID: b2d32446fb9a534e16f0ccce9f6ed9a552d2ba8a16d00f637ee5324b18a05ed7
                • Opcode Fuzzy Hash: d62a3c84492237c2e812364e2bcf7333d78d65b57f459d89bc87ed871bb9d6f7
                • Instruction Fuzzy Hash: A6211571D0021A9FCB10CF9AC4857EEFBF4AB48214F50812AD418A7341D778A9458BA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 225 22e6138-22e6184 227 22e6186-22e618e 225->227 228 22e6190-22e61bc SetThreadContext 225->228 227->228 229 22e61be-22e61c4 228->229 230 22e61c5-22e61e6 228->230 229->230
                APIs
                • SetThreadContext.KERNELBASE(?,00000000), ref: 022E61AF
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: d80de9157a05fce93e2b891ca1bf53088a8cb3639caa320dc2db64186150e45b
                • Instruction ID: 6a7d7872ab7bd7e6978360693e33690ae16facbca53581c853c3ea5410a11f52
                • Opcode Fuzzy Hash: d80de9157a05fce93e2b891ca1bf53088a8cb3639caa320dc2db64186150e45b
                • Instruction Fuzzy Hash: CE21F771D1021A9FCB10CF9AC9457EEFBF8BB48314F54816AD418B7341D778A9448FA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 232 22e61f8-22e627b ReadProcessMemory 234 22e627d-22e6283 232->234 235 22e6284-22e62a5 232->235 234->235
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 022E626E
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: 1c6b37b7b40424913d123eb396b75b058ea4ac3d5535b382dd8ecb2c090773e9
                • Instruction ID: ece681e63b6ba16be0d6c6644114d531eccb06a5856455d036e9eb5134babbfc
                • Opcode Fuzzy Hash: 1c6b37b7b40424913d123eb396b75b058ea4ac3d5535b382dd8ecb2c090773e9
                • Instruction Fuzzy Hash: BF21C4B1900249DFCB10CF9AC984BDEBBF8EB48324F548429E959A7250D378A945DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 237 22e62e8-22e6360 VirtualAllocEx 239 22e6369-22e637d 237->239 240 22e6362-22e6368 237->240 240->239
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 022E6353
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: b7e5460a38a93add99b752f44de4b149d8775876f9e27530c69cc1616063a4ce
                • Instruction ID: 60073946c3855b8812ed37069f4d9089b68356390b356da72e2adc14dad35c5a
                • Opcode Fuzzy Hash: b7e5460a38a93add99b752f44de4b149d8775876f9e27530c69cc1616063a4ce
                • Instruction Fuzzy Hash: 0C11D2B59002499FCB10CF9AC884BDEBBF8EB48324F248459E569A7250C375A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 242 22e64c8-22e6534 ResumeThread 244 22e653d-22e6551 242->244 245 22e6536-22e653c 242->245 245->244
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.480372185.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 5030637fbf52b05025f26d9fecdf4877381ea10c87f3ebcf1ac7492c119f7bf6
                • Instruction ID: e8dceec2c52ec1bad750f5035404372b75e8e36a0da1b0a3cdea4fee29677fdf
                • Opcode Fuzzy Hash: 5030637fbf52b05025f26d9fecdf4877381ea10c87f3ebcf1ac7492c119f7bf6
                • Instruction Fuzzy Hash: 2C1100B1900209CFCB20CF9AD484BDEBBF8EB48324F20845AD559A7300C378A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:10.8%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:83
                Total number of Limit Nodes:3
                execution_graph 13876 16ef658 13877 16ef6c0 CreateWindowExW 13876->13877 13879 16ef77c 13877->13879 13871 16eb760 13872 16eb761 DuplicateHandle 13871->13872 13873 16eb7f6 13872->13873 13874 16ef8a0 SetWindowLongW 13875 16ef90c 13874->13875 13880 16e8d50 13881 16e8d5f 13880->13881 13883 16e8e48 13880->13883 13884 16e8e5b 13883->13884 13886 16e8e73 13884->13886 13891 16e90c0 13884->13891 13895 16e90d0 13884->13895 13885 16e8e6b 13885->13886 13887 16e9070 GetModuleHandleW 13885->13887 13886->13881 13888 16e909d 13887->13888 13888->13881 13892 16e90d0 13891->13892 13894 16e9109 13892->13894 13899 16e81c8 13892->13899 13894->13885 13897 16e90d1 13895->13897 13896 16e9109 13896->13885 13897->13896 13898 16e81c8 LoadLibraryExW 13897->13898 13898->13896 13900 16e92b0 LoadLibraryExW 13899->13900 13902 16e9329 13900->13902 13902->13894 13903 16eb130 GetCurrentProcess 13904 16eb1aa GetCurrentThread 13903->13904 13905 16eb1a3 13903->13905 13906 16eb1e7 GetCurrentProcess 13904->13906 13907 16eb1e0 13904->13907 13905->13904 13908 16eb21d 13906->13908 13907->13906 13909 16eb245 GetCurrentThreadId 13908->13909 13910 16eb276 13909->13910 13911 16e4310 13912 16e4311 13911->13912 13915 16e3da0 13912->13915 13916 16e3dab 13915->13916 13919 16e3db0 13916->13919 13918 16e4327 13920 16e3dbb 13919->13920 13923 16e4034 13920->13923 13922 16e43ed 13922->13918 13924 16e403f 13923->13924 13927 16e4064 13924->13927 13926 16e44c2 13926->13922 13928 16e406f 13927->13928 13931 16e4094 13928->13931 13930 16e45d1 13930->13926 13933 16e409f 13931->13933 13932 16e6c0c 13932->13930 13933->13932 13935 16eae58 13933->13935 13936 16eae5c 13935->13936 13937 16eaead 13936->13937 13941 16eb008 13936->13941 13945 16eafd5 13936->13945 13949 16eb018 13936->13949 13937->13932 13942 16eb00c 13941->13942 13944 16eb05f 13942->13944 13953 16e9b4c 13942->13953 13944->13937 13946 16eafe4 13945->13946 13947 16e9b4c 2 API calls 13946->13947 13948 16eafeb 13946->13948 13947->13948 13948->13937 13950 16eb019 13949->13950 13951 16eb05f 13950->13951 13952 16e9b4c 2 API calls 13950->13952 13951->13937 13952->13951 13954 16e9b51 13953->13954 13956 16ebd58 13954->13956 13957 16eb364 13954->13957 13956->13956 13958 16eb36f 13957->13958 13959 16e4094 2 API calls 13958->13959 13960 16ebdc7 13959->13960 13964 16edb50 13960->13964 13969 16edb38 13960->13969 13961 16ebe00 13961->13956 13966 16edb51 13964->13966 13965 16edb8d 13965->13961 13966->13965 13967 16ede88 LoadLibraryExW GetModuleHandleW 13966->13967 13968 16ede98 LoadLibraryExW GetModuleHandleW 13966->13968 13967->13965 13968->13965 13971 16edb45 13969->13971 13970 16edb8d 13970->13961 13971->13970 13972 16ede88 LoadLibraryExW GetModuleHandleW 13971->13972 13973 16ede98 LoadLibraryExW GetModuleHandleW 13971->13973 13972->13970 13973->13970

                Control-flow Graph

                APIs
                • GetCurrentProcess.KERNEL32 ref: 016EB190
                • GetCurrentThread.KERNEL32 ref: 016EB1CD
                • GetCurrentProcess.KERNEL32 ref: 016EB20A
                • GetCurrentThreadId.KERNEL32 ref: 016EB263
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: a2953c11b191ea67ab9047299cdee3192bba601ee98311942bda8c80b3234263
                • Instruction ID: 941ad1a36a9377f0a05bb0eff563ebcd8b9721699cfb9fb9b36d3be95102b134
                • Opcode Fuzzy Hash: a2953c11b191ea67ab9047299cdee3192bba601ee98311942bda8c80b3234263
                • Instruction Fuzzy Hash: BF51C8B09012498FDB14DFAAD8487EEBFF1BF48314F20855AD419A73A1CB355845CF66
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 31 16eb120-16eb122 32 16eb124 31->32 33 16eb125-16eb12a 31->33 32->33 34 16eb12c 33->34 35 16eb12d-16eb1a1 GetCurrentProcess 33->35 34->35 37 16eb1aa-16eb1de GetCurrentThread 35->37 38 16eb1a3-16eb1a9 35->38 39 16eb1e7-16eb21b GetCurrentProcess 37->39 40 16eb1e0-16eb1e6 37->40 38->37 41 16eb21d-16eb223 39->41 42 16eb224-16eb23c 39->42 40->39 41->42 54 16eb23f call 16ebad8 42->54 55 16eb23f call 16eb6e9 42->55 56 16eb23f call 16ebac9 42->56 46 16eb245-16eb274 GetCurrentThreadId 47 16eb27d-16eb2df 46->47 48 16eb276-16eb27c 46->48 48->47 54->46 55->46 56->46
                APIs
                • GetCurrentProcess.KERNEL32 ref: 016EB190
                • GetCurrentThread.KERNEL32 ref: 016EB1CD
                • GetCurrentProcess.KERNEL32 ref: 016EB20A
                • GetCurrentThreadId.KERNEL32 ref: 016EB263
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: b9b1c5a785ccd8cd4539c689f7c9429ddcb3105c82915b4726039266e6759c20
                • Instruction ID: ffe7c305b82ac6cc50ffdb3230a813344e4a783ab600fafeb1a68a43faa50c18
                • Opcode Fuzzy Hash: b9b1c5a785ccd8cd4539c689f7c9429ddcb3105c82915b4726039266e6759c20
                • Instruction Fuzzy Hash: 635164B09052488FDB14CFAAD9487EEBFF1AF48320F24855AE019A33A1D7785844CB66
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • GetCurrentProcess.KERNEL32 ref: 016EB190
                • GetCurrentThread.KERNEL32 ref: 016EB1CD
                • GetCurrentProcess.KERNEL32 ref: 016EB20A
                • GetCurrentThreadId.KERNEL32 ref: 016EB263
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: d8e42a9646ef5319f77be4c6d75d1aa68c19086baabdce2def1c9f9ee3183b58
                • Instruction ID: 8685809dbaeb32f2ed3af9a4bdb631a7765c5171e2617a2c5e807b9c2b776af2
                • Opcode Fuzzy Hash: d8e42a9646ef5319f77be4c6d75d1aa68c19086baabdce2def1c9f9ee3183b58
                • Instruction Fuzzy Hash: 865124B09012498FDB14CFAAD948BEEBBF1BF48314F24855AE419B7360D7746844CF66
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 78 16e8e48-16e8e5d call 16e8164 81 16e8e5f 78->81 82 16e8e73-16e8e77 78->82 135 16e8e65 call 16e90c0 81->135 136 16e8e65 call 16e90d0 81->136 83 16e8e8b-16e8ecc 82->83 84 16e8e79-16e8e83 82->84 89 16e8ece-16e8ed6 83->89 90 16e8ed9-16e8ee7 83->90 84->83 85 16e8e6b-16e8e6d 85->82 87 16e8fa8-16e9022 85->87 126 16e9024 87->126 127 16e9025-16e9026 87->127 89->90 92 16e8f0b-16e8f0d 90->92 93 16e8ee9-16e8eee 90->93 96 16e8f10-16e8f17 92->96 94 16e8ef9 93->94 95 16e8ef0-16e8ef7 call 16e8170 93->95 99 16e8efb-16e8f09 94->99 95->99 100 16e8f19-16e8f21 96->100 101 16e8f24-16e8f2b 96->101 99->96 100->101 102 16e8f2d-16e8f35 101->102 103 16e8f38-16e8f41 call 16e8180 101->103 102->103 108 16e8f4e-16e8f53 103->108 109 16e8f43-16e8f4b 103->109 111 16e8f55-16e8f5c 108->111 112 16e8f71-16e8f75 108->112 109->108 111->112 113 16e8f5e-16e8f6e call 16e8190 call 16e81a0 111->113 137 16e8f78 call 16e93c8 112->137 138 16e8f78 call 16e93a1 112->138 113->112 116 16e8f7b-16e8f7e 119 16e8f80-16e8f9e 116->119 120 16e8fa1-16e8fa7 116->120 119->120 126->127 128 16e9028 127->128 129 16e9029-16e9068 127->129 128->129 130 16e906a-16e906d 129->130 131 16e9070-16e909b GetModuleHandleW 129->131 130->131 132 16e909d-16e90a3 131->132 133 16e90a4-16e90b8 131->133 132->133 135->85 136->85 137->116 138->116
                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 016E908E
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 4258cc1d3764ef9569e53dbc5525a23ee2d386eb3cc4378174023e0efb58c69f
                • Instruction ID: 59f3ab1f5134bad1c772ed7a993b1d4ad834aa99dfca037ed92e137633475859
                • Opcode Fuzzy Hash: 4258cc1d3764ef9569e53dbc5525a23ee2d386eb3cc4378174023e0efb58c69f
                • Instruction Fuzzy Hash: 45713470A01B058FD724DF2AD85879ABBF6BF88310F008A2ED54A97B50DB75E845CF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 139 16ef64c-16ef64e 140 16ef650 139->140 141 16ef651-16ef652 139->141 140->141 142 16ef654 141->142 143 16ef655-16ef6be 141->143 142->143 144 16ef6c9-16ef6d0 143->144 145 16ef6c0-16ef6c6 143->145 146 16ef6db-16ef713 144->146 147 16ef6d2-16ef6d8 144->147 145->144 148 16ef71b-16ef77a CreateWindowExW 146->148 147->146 149 16ef77c-16ef782 148->149 150 16ef783-16ef7bb 148->150 149->150 154 16ef7bd-16ef7c0 150->154 155 16ef7c8 150->155 154->155 156 16ef7c9 155->156 156->156
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 016EF76A
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: ec1246f049573546787bac377b21fd952651aaa13d403022760b02a6554e5e71
                • Instruction ID: 735968cdb7db79150fc72583836113e155f742a81eff9cf245fc9540b590a095
                • Opcode Fuzzy Hash: ec1246f049573546787bac377b21fd952651aaa13d403022760b02a6554e5e71
                • Instruction Fuzzy Hash: DA51D0B1D012199FDF14CFAAC984ADDBFF2BF48314F24866AE819AB210D7749845CF90
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 157 16ef658-16ef6be 158 16ef6c9-16ef6d0 157->158 159 16ef6c0-16ef6c6 157->159 160 16ef6db-16ef77a CreateWindowExW 158->160 161 16ef6d2-16ef6d8 158->161 159->158 163 16ef77c-16ef782 160->163 164 16ef783-16ef7bb 160->164 161->160 163->164 168 16ef7bd-16ef7c0 164->168 169 16ef7c8 164->169 168->169 170 16ef7c9 169->170 170->170
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 016EF76A
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: 65630186b0e8aa72e01a1d2091dd5a4de0f9f7b01f54eb929bdd4c2b552d38dd
                • Instruction ID: fa23e04fffcfc3e9e321388421f962385ffd85bab6eba2d65e0b74e1e45e161b
                • Opcode Fuzzy Hash: 65630186b0e8aa72e01a1d2091dd5a4de0f9f7b01f54eb929bdd4c2b552d38dd
                • Instruction Fuzzy Hash: 9E41AEB1D002199FDF14CFAAD884ADEBFF5BF48710F24826AE819AB210D7749945CF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 171 16eb758-16eb75a 172 16eb75c 171->172 173 16eb75d 171->173 172->173 174 16eb74e 172->174 175 16eb75e 173->175 176 16eb761-16eb7f4 DuplicateHandle 173->176 174->171 175->176 179 16eb760 175->179 177 16eb7fd-16eb81a 176->177 178 16eb7f6-16eb7fc 176->178 178->177 179->176
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016EB7E7
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 850059d716a342b84ad566900262c2602d602b280b4486b92165472445530666
                • Instruction ID: 9fb78a890fa9e2edaba814fe1d1f902b51bea4b82763ac5a04d87cafe26255c6
                • Opcode Fuzzy Hash: 850059d716a342b84ad566900262c2602d602b280b4486b92165472445530666
                • Instruction Fuzzy Hash: 982126B58012099FDF10CF9AD888AEEBFF5EB48320F14811AE914B3721C378A944CF65
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 182 16eb760-16eb7f4 DuplicateHandle 184 16eb7fd-16eb81a 182->184 185 16eb7f6-16eb7fc 182->185 185->184
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016EB7E7
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: de1f7c8f4a27672977a79e172cc32c162a98c27d284843402e83e526626d7ce3
                • Instruction ID: 38d1806fd243a6e6cbdbdff310ba9eac62fe6402aca011ac82bd2faaa6e2cc40
                • Opcode Fuzzy Hash: de1f7c8f4a27672977a79e172cc32c162a98c27d284843402e83e526626d7ce3
                • Instruction Fuzzy Hash: 8321B5B59012099FDB10CF9AD984ADEBFF5EB48310F14841AE954B3310D378A954CF65
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 188 16e81c8-16e92f0 190 16e92f8-16e9327 LoadLibraryExW 188->190 191 16e92f2-16e92f5 188->191 192 16e9329-16e932f 190->192 193 16e9330-16e934d 190->193 191->190 192->193
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,016E9109,00000800,00000000,00000000), ref: 016E931A
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 88918b5cc3559f8ef5bd7160f011ca2fc5ca41395520e9d48fd6d1af5f164459
                • Instruction ID: e4464c4e94d00353546dd712750e52efebacc3afa3b494445fb5feb1d4682382
                • Opcode Fuzzy Hash: 88918b5cc3559f8ef5bd7160f011ca2fc5ca41395520e9d48fd6d1af5f164459
                • Instruction Fuzzy Hash: EF1103B69002088FDB10CFAAC848ADEFBF4AB48314F14852AE919B7300C378A545CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 197 16e92a9-16e92f0 199 16e92f8-16e9327 LoadLibraryExW 197->199 200 16e92f2-16e92f5 197->200 201 16e9329-16e932f 199->201 202 16e9330-16e934d 199->202 200->199 201->202
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,016E9109,00000800,00000000,00000000), ref: 016E931A
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 351a57175de756427e8124ebd5448873bf24bf858bdb93854d1b3247891c36bf
                • Instruction ID: cb451b26e8f70fdadbcdd8bd2377f5bc58501161400295e2da65d0c951338b54
                • Opcode Fuzzy Hash: 351a57175de756427e8124ebd5448873bf24bf858bdb93854d1b3247891c36bf
                • Instruction Fuzzy Hash: 021103B69002499FDB10CFAAC848ADEFBF5AF88354F14851AE919B7300C379A545CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 206 16e9350-16e935a 207 16e935c 206->207 208 16e935d-16e935e 206->208 207->208 209 16e92e8-16e92f4 207->209 210 16e9360 208->210 211 16e9361-16e936d 208->211 212 16e92f8-16e9327 LoadLibraryExW 209->212 210->211 213 16e936f-16e9373 211->213 214 16e9374-16e9380 211->214 215 16e9329-16e932f 212->215 216 16e9330-16e934d 212->216 220 16e938a-16e939f call 16e8180 214->220 221 16e9382-16e9389 214->221 215->216
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,016E9109,00000800,00000000,00000000), ref: 016E931A
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 5659c11628e43c1e5c923e8513b39d97f0116419f3d8e7b73e474a2bc5616a60
                • Instruction ID: cb7a52cb53754d712e70c3a9b420d8b8b56df4dbadd8e0ad3799799d5cb74d0c
                • Opcode Fuzzy Hash: 5659c11628e43c1e5c923e8513b39d97f0116419f3d8e7b73e474a2bc5616a60
                • Instruction Fuzzy Hash: F511C2B19043448FCF118FA9D8087DAFFF5EF86328F18818AE549A7252C3759505CB65
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 226 16e9028-16e9068 228 16e906a-16e906d 226->228 229 16e9070-16e909b GetModuleHandleW 226->229 228->229 230 16e909d-16e90a3 229->230 231 16e90a4-16e90b8 229->231 230->231
                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 016E908E
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 06ff94bcad3a338a9c9315fd25d9e656c17996631ae73fc248ac385140135041
                • Instruction ID: 29ad2716971f7c390c46248ce894102a94cbc9276f3acecc1da6bb1554f745dd
                • Opcode Fuzzy Hash: 06ff94bcad3a338a9c9315fd25d9e656c17996631ae73fc248ac385140135041
                • Instruction Fuzzy Hash: 0B11DFB6C002498FDB20CF9AC844BDEFBF4AF88324F14851AD559A7710D379A545CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 233 16ef898-16ef89a 234 16ef89c 233->234 235 16ef89d-16ef90a SetWindowLongW 233->235 234->235 236 16ef90c-16ef912 235->236 237 16ef913-16ef927 235->237 236->237
                APIs
                • SetWindowLongW.USER32(?,?,?), ref: 016EF8FD
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: LongWindow
                • String ID:
                • API String ID: 1378638983-0
                • Opcode ID: 4cac2fe5dd25b02d5154381041236fa7022e2fe96d5565a77d942e9e40095261
                • Instruction ID: 9cdf8a291040e4e3487ea5afec2f7cb365c87bbf83177efa94477c330d3de845
                • Opcode Fuzzy Hash: 4cac2fe5dd25b02d5154381041236fa7022e2fe96d5565a77d942e9e40095261
                • Instruction Fuzzy Hash: FE1122B68002098FDB10CF9AD588BDEBFF8EB48320F21855AD959B7300C374A944CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 239 16ef8a0-16ef90a SetWindowLongW 240 16ef90c-16ef912 239->240 241 16ef913-16ef927 239->241 240->241
                APIs
                • SetWindowLongW.USER32(?,?,?), ref: 016EF8FD
                Memory Dump Source
                • Source File: 00000001.00000002.743420953.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_16e0000_OmPnD1qvad.jbxd
                Similarity
                • API ID: LongWindow
                • String ID:
                • API String ID: 1378638983-0
                • Opcode ID: 5e6ce411e90a7e5a369225af791505ca299dec8a53eb520965334f127d50c7b0
                • Instruction ID: d4b5137a926cc8b258faf71d61e2528f9af1e3d76c34f714c9e24250b6bc7642
                • Opcode Fuzzy Hash: 5e6ce411e90a7e5a369225af791505ca299dec8a53eb520965334f127d50c7b0
                • Instruction Fuzzy Hash: 411103B59002089FDB10CF9AD484BDEBBF8EB48320F20855AD959A3300C374A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:25.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:66
                Total number of Limit Nodes:2
                execution_graph 3544 5890448 3545 589044e 3544->3545 3546 5890452 3545->3546 3548 58922b4 3545->3548 3550 58922cf 3548->3550 3549 58922dc 3549->3546 3553 5893db0 3550->3553 3557 5893da0 3550->3557 3554 5893dbc 3553->3554 3555 5893dc6 3554->3555 3561 5895638 3554->3561 3555->3549 3558 5893dbc 3557->3558 3559 5893dc6 3558->3559 3560 5895638 12 API calls 3558->3560 3559->3549 3560->3558 3562 5895648 3561->3562 3563 58956e9 3562->3563 3590 5895d00 3562->3590 3594 5895cf4 3562->3594 3570 58959df 3563->3570 3598 58961f0 3563->3598 3602 58961f8 3563->3602 3564 5895a38 3620 58964c8 3564->3620 3623 58964c0 3564->3623 3565 5895a60 3565->3554 3566 58957ce 3605 58962e8 3566->3605 3608 58962e0 3566->3608 3567 589584a 3567->3570 3612 5896390 3567->3612 3616 5896388 3567->3616 3568 58958b7 3569 58959a1 3568->3569 3580 5896388 WriteProcessMemory 3568->3580 3581 5896390 WriteProcessMemory 3568->3581 3586 5896388 WriteProcessMemory 3569->3586 3587 5896390 WriteProcessMemory 3569->3587 3571 5895a1b 3570->3571 3627 5896138 3570->3627 3631 5896133 3570->3631 3571->3564 3582 5896138 SetThreadContext 3571->3582 3583 5896133 SetThreadContext 3571->3583 3580->3568 3581->3568 3582->3564 3583->3564 3586->3570 3587->3570 3592 5895d8d CreateProcessAsUserA 3590->3592 3593 5895fa8 3592->3593 3596 5895d00 CreateProcessAsUserA 3594->3596 3597 5895fa8 3596->3597 3599 58961f8 ReadProcessMemory 3598->3599 3601 589627d 3599->3601 3601->3566 3603 5896240 ReadProcessMemory 3602->3603 3604 589627d 3603->3604 3604->3566 3606 589632b VirtualAllocEx 3605->3606 3607 5896362 3606->3607 3607->3567 3609 58962e8 VirtualAllocEx 3608->3609 3611 5896362 3609->3611 3611->3567 3613 58963db WriteProcessMemory 3612->3613 3615 589642a 3613->3615 3615->3568 3617 5896390 WriteProcessMemory 3616->3617 3619 589642a 3617->3619 3619->3568 3621 5896509 ResumeThread 3620->3621 3622 5896536 3621->3622 3622->3565 3624 58964c8 ResumeThread 3623->3624 3626 5896536 3624->3626 3626->3565 3628 5896180 SetThreadContext 3627->3628 3630 58961be 3628->3630 3630->3571 3632 5896138 SetThreadContext 3631->3632 3634 58961be 3632->3634 3634->3571

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 5895cf4-5895d99 3 5895d9b-5895dc0 0->3 4 5895ded-5895e0f 0->4 3->4 7 5895dc2-5895dc4 3->7 8 5895e11-5895e39 4->8 9 5895e66-5895e96 4->9 10 5895de7-5895dea 7->10 11 5895dc6-5895dd0 7->11 8->9 19 5895e3b-5895e3d 8->19 17 5895e98-5895ebd 9->17 18 5895eea-5895fa6 CreateProcessAsUserA 9->18 10->4 12 5895dd2 11->12 13 5895dd4-5895de3 11->13 12->13 13->13 16 5895de5 13->16 16->10 17->18 27 5895ebf-5895ec1 17->27 31 5895fa8-5895fae 18->31 32 5895faf-5896023 18->32 20 5895e3f-5895e49 19->20 21 5895e60-5895e63 19->21 22 5895e4b 20->22 23 5895e4d-5895e5c 20->23 21->9 22->23 23->23 26 5895e5e 23->26 26->21 29 5895ec3-5895ecd 27->29 30 5895ee4-5895ee7 27->30 33 5895ecf 29->33 34 5895ed1-5895ee0 29->34 30->18 31->32 43 5896033-5896037 32->43 44 5896025-5896029 32->44 33->34 34->34 35 5895ee2 34->35 35->30 46 5896039-589603d 43->46 47 5896047-589604b 43->47 44->43 45 589602b 44->45 45->43 46->47 48 589603f 46->48 49 589605b-589605f 47->49 50 589604d-5896051 47->50 48->47 51 5896071-5896078 49->51 52 5896061-5896067 49->52 50->49 53 5896053 50->53 54 589607a-5896089 51->54 55 589608f 51->55 52->51 53->49 54->55 57 5896090 55->57 57->57
                APIs
                • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 05895F93
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: CreateProcessUser
                • String ID:
                • API String ID: 2217836671-0
                • Opcode ID: 644f7e69594f1eea592833fbd4037cde7f158512886f6964c3c6c295be40d19d
                • Instruction ID: 6cbbb67125bcf38c9f85330058c79969ea492d3eec297690e0f383843ff4e862
                • Opcode Fuzzy Hash: 644f7e69594f1eea592833fbd4037cde7f158512886f6964c3c6c295be40d19d
                • Instruction Fuzzy Hash: C0A14871E002198FDF15CFA9C8817EDBAB2FF48304F0481A9E859E7290DB759985CF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 58 5895d00-5895d99 60 5895d9b-5895dc0 58->60 61 5895ded-5895e0f 58->61 60->61 64 5895dc2-5895dc4 60->64 65 5895e11-5895e39 61->65 66 5895e66-5895e96 61->66 67 5895de7-5895dea 64->67 68 5895dc6-5895dd0 64->68 65->66 76 5895e3b-5895e3d 65->76 74 5895e98-5895ebd 66->74 75 5895eea-5895fa6 CreateProcessAsUserA 66->75 67->61 69 5895dd2 68->69 70 5895dd4-5895de3 68->70 69->70 70->70 73 5895de5 70->73 73->67 74->75 84 5895ebf-5895ec1 74->84 88 5895fa8-5895fae 75->88 89 5895faf-5896023 75->89 77 5895e3f-5895e49 76->77 78 5895e60-5895e63 76->78 79 5895e4b 77->79 80 5895e4d-5895e5c 77->80 78->66 79->80 80->80 83 5895e5e 80->83 83->78 86 5895ec3-5895ecd 84->86 87 5895ee4-5895ee7 84->87 90 5895ecf 86->90 91 5895ed1-5895ee0 86->91 87->75 88->89 100 5896033-5896037 89->100 101 5896025-5896029 89->101 90->91 91->91 92 5895ee2 91->92 92->87 103 5896039-589603d 100->103 104 5896047-589604b 100->104 101->100 102 589602b 101->102 102->100 103->104 105 589603f 103->105 106 589605b-589605f 104->106 107 589604d-5896051 104->107 105->104 108 5896071-5896078 106->108 109 5896061-5896067 106->109 107->106 110 5896053 107->110 111 589607a-5896089 108->111 112 589608f 108->112 109->108 110->106 111->112 114 5896090 112->114 114->114
                APIs
                • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 05895F93
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: CreateProcessUser
                • String ID:
                • API String ID: 2217836671-0
                • Opcode ID: 6588f6f4acf0aaea14d1f406c84e9992992d2ee539a6a0579e5852db790f03f7
                • Instruction ID: cf111bd826533401d0b68beac1fe501ef5544eed16e0dea32e40f89e409a7530
                • Opcode Fuzzy Hash: 6588f6f4acf0aaea14d1f406c84e9992992d2ee539a6a0579e5852db790f03f7
                • Instruction Fuzzy Hash: A0A14871E002198FDF15CFA9C8817EDBAB6FF48304F0481A9E819E7290DB759985CF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 115 5896388-58963e1 118 58963f1-5896423 WriteProcessMemory 115->118 119 58963e3-58963ef 115->119 120 589642a 118->120 119->118 121 589642c-5896432 120->121 122 5896433-5896454 120->122 121->122
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0589641D
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 751ed29abcafe580bb5f21b9d74040ad4c953da370d48afe1ae6c9fcf58967a6
                • Instruction ID: b8cc0c09d787cf11769e24fa47033dc04a789ffac3b3794f3d23171369f6e577
                • Opcode Fuzzy Hash: 751ed29abcafe580bb5f21b9d74040ad4c953da370d48afe1ae6c9fcf58967a6
                • Instruction Fuzzy Hash: BA21F2B1901259DFCB14CF9AC885BDEBBF4FB48310F54842AE919A3350D778A944CBA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 124 5896390-58963e1 126 58963f1-5896423 WriteProcessMemory 124->126 127 58963e3-58963ef 124->127 128 589642a 126->128 127->126 129 589642c-5896432 128->129 130 5896433-5896454 128->130 129->130
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0589641D
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: b495bf7a8ed113557080dc6c07cfb839ae35e0c904c29a2fdbcf3ecec1c688da
                • Instruction ID: e10de4667df22d9765bbaeda0be542ccf080888d48d40327089123d56f0bf797
                • Opcode Fuzzy Hash: b495bf7a8ed113557080dc6c07cfb839ae35e0c904c29a2fdbcf3ecec1c688da
                • Instruction Fuzzy Hash: F72100B19002599FCB14CF9AC884BDEBBF4FB48310F14842AE919A3350D778A944CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 140 58961f0-589627b ReadProcessMemory 143 589627d-5896283 140->143 144 5896284-58962a5 140->144 143->144
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0589626E
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: c8a70704222a0ff633aed096548bd50d8a60bf9118b1825247f3f9731c863ae0
                • Instruction ID: 9a0ba098e2906d6fa64e0d89edac2087e4dc7c12b62af22922d31834bb458ef1
                • Opcode Fuzzy Hash: c8a70704222a0ff633aed096548bd50d8a60bf9118b1825247f3f9731c863ae0
                • Instruction Fuzzy Hash: 332115719002499FCB10CF9AC884BDEBBF4EB48320F148029E858A3210D378A944DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 132 5896133-5896184 135 5896190-58961bc SetThreadContext 132->135 136 5896186-589618e 132->136 137 58961be-58961c4 135->137 138 58961c5-58961e6 135->138 136->135 137->138
                APIs
                • SetThreadContext.KERNELBASE(?,00000000), ref: 058961AF
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: cd68cb7634e96dfb106bd7c211a1b638a89c695e7b336fc6b9abac0750035963
                • Instruction ID: e5ffaf1eed522cb8a32ff3a043c72a0a3c2e9025ff44d595ebe23753f213a581
                • Opcode Fuzzy Hash: cd68cb7634e96dfb106bd7c211a1b638a89c695e7b336fc6b9abac0750035963
                • Instruction Fuzzy Hash: 5221E5719002199BCB14DF9AC88579EFBF4BB48314F54812AE818B3741D778A9448FA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 146 5896138-5896184 148 5896190-58961bc SetThreadContext 146->148 149 5896186-589618e 146->149 150 58961be-58961c4 148->150 151 58961c5-58961e6 148->151 149->148 150->151
                APIs
                • SetThreadContext.KERNELBASE(?,00000000), ref: 058961AF
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: f841b46b01b6fc7f09c2c78cf9f80ff182e01d26b517e8860e4c8c161628f0f6
                • Instruction ID: 5a775d396e12f7a57f35235e802ee1466965d13f76cb18ddae250ad8dbbdc3db
                • Opcode Fuzzy Hash: f841b46b01b6fc7f09c2c78cf9f80ff182e01d26b517e8860e4c8c161628f0f6
                • Instruction Fuzzy Hash: C821F771D002199FCB14DF9AC8457DEFBF4BB48314F14812AD818B3741D778A9448FA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 153 58961f8-589627b ReadProcessMemory 155 589627d-5896283 153->155 156 5896284-58962a5 153->156 155->156
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0589626E
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: 25191bf1cd2d905f6d0e16af9cc9bf127043887628fed4f6363c2017efc1c016
                • Instruction ID: 0216282122eb9ba002b0f9c1fd6355522c78dccb0020b9afb6223f9625318a96
                • Opcode Fuzzy Hash: 25191bf1cd2d905f6d0e16af9cc9bf127043887628fed4f6363c2017efc1c016
                • Instruction Fuzzy Hash: BD21D3B1900249DFCB10CF9AC884BDEFBF5FB48324F14842AE958A7650D378A944DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 158 58962e0-5896360 VirtualAllocEx 161 5896369-589637d 158->161 162 5896362-5896368 158->162 162->161
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05896353
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: ed6c6de7a0abf256cf5655f6ca62a8439f09c260446c8080e7a80f1e4a0fba16
                • Instruction ID: df52633323defe63ac0c797d93b31b05be3fd7c4c4b8aeb87db7aab006fbbe7c
                • Opcode Fuzzy Hash: ed6c6de7a0abf256cf5655f6ca62a8439f09c260446c8080e7a80f1e4a0fba16
                • Instruction Fuzzy Hash: 151102B59002499FCB10CF9AC884BDEBFF4FB48324F148419E529A7750D375A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 164 58962e8-5896360 VirtualAllocEx 166 5896369-589637d 164->166 167 5896362-5896368 164->167 167->166
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05896353
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 13ba7b2e8e94555ba8b144bbe18b095c36b90f650797162c03924774f97dcc8d
                • Instruction ID: c7db2787a08d19b3b7f17d62465453a3e379363ac8cebbc6ab5a1e30d2e72295
                • Opcode Fuzzy Hash: 13ba7b2e8e94555ba8b144bbe18b095c36b90f650797162c03924774f97dcc8d
                • Instruction Fuzzy Hash: A011E3B5900249DFCB10CF9AC884BDEBFF4FB48324F148419E529A7650D375A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 169 58964c0-5896534 ResumeThread 172 589653d-5896551 169->172 173 5896536-589653c 169->173 173->172
                APIs
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: ce57c6b922759e9860a2f1a7dcb0e88c3c734d72f3b4e8e1fe23b276bc67d03a
                • Instruction ID: 09c1728cbf4ac0550b841b02c5f69da7b0b1a2df4791d5ffa4306ce52198dfed
                • Opcode Fuzzy Hash: ce57c6b922759e9860a2f1a7dcb0e88c3c734d72f3b4e8e1fe23b276bc67d03a
                • Instruction Fuzzy Hash: 4A11F2B18002498FCB10DF9AD484BDEBFF4EB48724F24845AD419B3700D778A984CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 175 58964c8-5896534 ResumeThread 177 589653d-5896551 175->177 178 5896536-589653c 175->178 178->177
                APIs
                Memory Dump Source
                • Source File: 00000009.00000002.488841099.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_9_2_5890000_svchost.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: d9510b49ce19e0f55d50477e3031cc3539f4e24e7125f86064a159a8c6469a7a
                • Instruction ID: 64c218aa9d8aef9d841a8c8a84e68ca8946d8a73b5990f61b240c73e43a47d5a
                • Opcode Fuzzy Hash: d9510b49ce19e0f55d50477e3031cc3539f4e24e7125f86064a159a8c6469a7a
                • Instruction Fuzzy Hash: 321112B1800249CFCB10DF9AD484BDEBBF8EB48324F24845AD419B3700D378A944CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:10.2%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:98
                Total number of Limit Nodes:2
                execution_graph 14620 5c58d50 14621 5c58d5f 14620->14621 14624 5c58e48 14620->14624 14632 5c58e38 14620->14632 14625 5c58e5b 14624->14625 14626 5c58e73 14625->14626 14640 5c590d0 14625->14640 14644 5c590cf 14625->14644 14626->14621 14627 5c59070 GetModuleHandleW 14629 5c5909d 14627->14629 14628 5c58e6b 14628->14626 14628->14627 14629->14621 14633 5c58e5b 14632->14633 14634 5c58e73 14633->14634 14638 5c590d0 LoadLibraryExW 14633->14638 14639 5c590cf LoadLibraryExW 14633->14639 14634->14621 14635 5c59070 GetModuleHandleW 14637 5c5909d 14635->14637 14636 5c58e6b 14636->14634 14636->14635 14637->14621 14638->14636 14639->14636 14641 5c590e4 14640->14641 14643 5c59109 14641->14643 14648 5c581c8 14641->14648 14643->14628 14645 5c590e4 14644->14645 14646 5c59109 14645->14646 14647 5c581c8 LoadLibraryExW 14645->14647 14646->14628 14647->14646 14649 5c592b0 LoadLibraryExW 14648->14649 14651 5c59329 14649->14651 14651->14643 14652 5c54310 14653 5c5431e 14652->14653 14656 5c53db0 14653->14656 14657 5c53dbb 14656->14657 14660 5c54034 14657->14660 14659 5c54327 14661 5c5403f 14660->14661 14664 5c54044 14661->14664 14663 5c5444d 14663->14659 14665 5c5404f 14664->14665 14668 5c54074 14665->14668 14667 5c54522 14667->14663 14669 5c5407f 14668->14669 14672 5c540a4 14669->14672 14671 5c54631 14671->14667 14673 5c540af 14672->14673 14674 5c56c04 14673->14674 14677 5c5ae67 14673->14677 14682 5c5ae68 14673->14682 14674->14671 14678 5c5ae89 14677->14678 14679 5c5aead 14678->14679 14687 5c5b017 14678->14687 14691 5c5b018 14678->14691 14679->14674 14683 5c5ae89 14682->14683 14684 5c5aead 14683->14684 14685 5c5b017 3 API calls 14683->14685 14686 5c5b018 3 API calls 14683->14686 14684->14674 14685->14684 14686->14684 14688 5c5b025 14687->14688 14689 5c5b05f 14688->14689 14695 5c59b4c 14688->14695 14689->14679 14693 5c5b025 14691->14693 14692 5c5b05f 14692->14679 14693->14692 14694 5c59b4c 3 API calls 14693->14694 14694->14692 14696 5c59b57 14695->14696 14698 5c5bd58 14696->14698 14699 5c5b364 14696->14699 14698->14698 14700 5c5b36f 14699->14700 14701 5c540a4 3 API calls 14700->14701 14702 5c5bdc7 14701->14702 14706 5c5db50 14702->14706 14715 5c5db38 14702->14715 14703 5c5be00 14703->14698 14708 5c5db81 14706->14708 14709 5c5dc73 14706->14709 14707 5c5db8d 14707->14703 14708->14707 14713 5c5de97 LoadLibraryExW GetModuleHandleW 14708->14713 14714 5c5de98 LoadLibraryExW GetModuleHandleW 14708->14714 14709->14703 14710 5c5dbce 14711 5c5e850 CreateWindowExW 14710->14711 14712 5c5e860 CreateWindowExW 14710->14712 14711->14709 14712->14709 14713->14710 14714->14710 14716 5c5db45 14715->14716 14717 5c5db8d 14716->14717 14721 5c5de97 LoadLibraryExW GetModuleHandleW 14716->14721 14722 5c5de98 LoadLibraryExW GetModuleHandleW 14716->14722 14717->14703 14718 5c5dbce 14719 5c5e850 CreateWindowExW 14718->14719 14720 5c5e860 CreateWindowExW 14718->14720 14719->14717 14720->14717 14721->14718 14722->14718 14723 5c5b130 14724 5c5b196 14723->14724 14725 5c5b245 14724->14725 14728 5c5b6e9 14724->14728 14732 5c5b6f8 14724->14732 14729 5c5b6f8 14728->14729 14735 5c59bac 14729->14735 14733 5c59bac DuplicateHandle 14732->14733 14734 5c5b726 14733->14734 14734->14725 14736 5c5b760 DuplicateHandle 14735->14736 14737 5c5b726 14736->14737 14737->14725 14738 5c5439f 14739 5c543b0 14738->14739 14740 5c54034 3 API calls 14739->14740 14741 5c543b5 14740->14741

                Control-flow Graph

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 05C5908E
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 81103f9ede75bdc0f058463bcf3a54cf50337bf7f64935fcc2700f15e993aa68
                • Instruction ID: c1c06c4686a23ec115708bbb89d380d418f4f98a5be93ce97f9010528aa176e0
                • Opcode Fuzzy Hash: 81103f9ede75bdc0f058463bcf3a54cf50337bf7f64935fcc2700f15e993aa68
                • Instruction Fuzzy Hash: 31713670A00B058FD764DFAAD44475ABBF2BF88310F108A2DE44AD7A40D774E985CF95
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 58 5c5f64c-5c5f6be 60 5c5f6c0-5c5f6c6 58->60 61 5c5f6c9-5c5f6d0 58->61 60->61 62 5c5f6d2-5c5f6d8 61->62 63 5c5f6db-5c5f713 61->63 62->63 64 5c5f71b-5c5f77a CreateWindowExW 63->64 65 5c5f783-5c5f7bb 64->65 66 5c5f77c-5c5f782 64->66 70 5c5f7bd-5c5f7c0 65->70 71 5c5f7c8 65->71 66->65 70->71 72 5c5f7c9 71->72 72->72
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05C5F76A
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: 6e6687052a1131f58e5645b33459388e4485b4ec83acfe2a2a5f2cbffa3fc883
                • Instruction ID: 8a9c3deac0191f5dfd4631749ff55e45487fdd283914c0ce4a4e9a161dbc3abb
                • Opcode Fuzzy Hash: 6e6687052a1131f58e5645b33459388e4485b4ec83acfe2a2a5f2cbffa3fc883
                • Instruction Fuzzy Hash: B251BFB1D003099FDB14CFAAC880ADEBBB5BF48354F24852AE819AB250D7749985CF94
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 73 5c5d464-5c5f6be 75 5c5f6c0-5c5f6c6 73->75 76 5c5f6c9-5c5f6d0 73->76 75->76 77 5c5f6d2-5c5f6d8 76->77 78 5c5f6db-5c5f77a CreateWindowExW 76->78 77->78 80 5c5f783-5c5f7bb 78->80 81 5c5f77c-5c5f782 78->81 85 5c5f7bd-5c5f7c0 80->85 86 5c5f7c8 80->86 81->80 85->86 87 5c5f7c9 86->87 87->87
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05C5F76A
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: 52658909bf91863f99fa0a114286db89f53dfbf7d4c40d38e8492941f0586f0e
                • Instruction ID: 63d8abde7eb258b78a55ba04d6936d5700004d460033debb563d523c0dbf4d1c
                • Opcode Fuzzy Hash: 52658909bf91863f99fa0a114286db89f53dfbf7d4c40d38e8492941f0586f0e
                • Instruction Fuzzy Hash: A8519DB1D00209DFDB14CFAAC884ADEBBB5BF48350F24852AE819AB250D7749985CF94
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 94 5c5b758-5c5b75b 95 5c5b760-5c5b7f4 DuplicateHandle 94->95 96 5c5b7f6-5c5b7fc 95->96 97 5c5b7fd-5c5b81a 95->97 96->97
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,05C5B726,?,?,?,?,?), ref: 05C5B7E7
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 182c510fdaba8a936becb4009335a83fe4a6a63af2a86e569ca196b96352bd2b
                • Instruction ID: 45f6dcbd7a3109dbb295b4e265ee4cadfcdf8d2610526277e0e91db5db9158f3
                • Opcode Fuzzy Hash: 182c510fdaba8a936becb4009335a83fe4a6a63af2a86e569ca196b96352bd2b
                • Instruction Fuzzy Hash: D321D4B59002099FDB10CFAAD885ADEBFF9FB48324F14841AE915B3310D378A944DF65
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 88 5c59bac-5c5b7f4 DuplicateHandle 90 5c5b7f6-5c5b7fc 88->90 91 5c5b7fd-5c5b81a 88->91 90->91
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,05C5B726,?,?,?,?,?), ref: 05C5B7E7
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 90341c56e3778afdbe611a81d71afabc672b783ffd6af1e4d4a321b26cc2c71e
                • Instruction ID: 390928b6e2a4dd1e0590c67f64ded6016b9f710c77863a23dbf5de79c631b428
                • Opcode Fuzzy Hash: 90341c56e3778afdbe611a81d71afabc672b783ffd6af1e4d4a321b26cc2c71e
                • Instruction Fuzzy Hash: A121D4B59002099FDB10CFAAD984ADEBFF9EB48364F14841AE915B3310D378A944CFA4
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 5c581c8-5c592f0 102 5c592f2-5c592f5 100->102 103 5c592f8-5c59327 LoadLibraryExW 100->103 102->103 104 5c59330-5c5934d 103->104 105 5c59329-5c5932f 103->105 105->104
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,05C59109,00000800,00000000,00000000), ref: 05C5931A
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 6142aecfaf2b67c46a6318f4122fd74044a4074819a6296f8b54a01f3058de9f
                • Instruction ID: 3cfcfa8148d8d5daa753a9d0592b306f44eb5705a582cdde6d16db93b944b529
                • Opcode Fuzzy Hash: 6142aecfaf2b67c46a6318f4122fd74044a4074819a6296f8b54a01f3058de9f
                • Instruction Fuzzy Hash: B91106B2900209CFCB10CF9AC844ADEFBF5EB48320F54845AE915B7310C378A545CFA9
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 109 5c592a9-5c592f0 111 5c592f2-5c592f5 109->111 112 5c592f8-5c59327 LoadLibraryExW 109->112 111->112 113 5c59330-5c5934d 112->113 114 5c59329-5c5932f 112->114 114->113
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,05C59109,00000800,00000000,00000000), ref: 05C5931A
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 399f5028506fbf2338cbc9eece0dd78fbabe85377b2994a7316838a1726cd977
                • Instruction ID: a64b4d422fdf7a804b8c96a60313f45e50c1824834503cce9ea101721b156db4
                • Opcode Fuzzy Hash: 399f5028506fbf2338cbc9eece0dd78fbabe85377b2994a7316838a1726cd977
                • Instruction Fuzzy Hash: F61103B6800209CFCB10CF9AC884ADEFBF4AB48320F14845AE916B7710C378A545CFA4
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 118 5c59028-5c59068 119 5c59070-5c5909b GetModuleHandleW 118->119 120 5c5906a-5c5906d 118->120 121 5c590a4-5c590b8 119->121 122 5c5909d-5c590a3 119->122 120->119 122->121
                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 05C5908E
                Memory Dump Source
                • Source File: 0000000A.00000002.743989671.0000000005C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_5c50000_svchost.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 3766a0184fa339abd66b4399765e7a1940c836a8c95d25dd76a48edd7f5c2188
                • Instruction ID: cb1fe1899e9701660460b0b419a0e0769a4d91006165221efd3775f62322ea61
                • Opcode Fuzzy Hash: 3766a0184fa339abd66b4399765e7a1940c836a8c95d25dd76a48edd7f5c2188
                • Instruction Fuzzy Hash: 6411D2B5C00249CFCB10CF9AD444BDEFBF4EB88224F14895AE819A7610D379A545CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000A.00000002.742779236.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_17cd000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3e07ca86520e24afd9e13de3a3b0ed0b1a611bf2a84d344df7beb8e5d7dbe37f
                • Instruction ID: f9bf2585f0b539abcc7833f555efc83e19b0189987805b78e7235b27d065da67
                • Opcode Fuzzy Hash: 3e07ca86520e24afd9e13de3a3b0ed0b1a611bf2a84d344df7beb8e5d7dbe37f
                • Instruction Fuzzy Hash: D421E2B1504240DFDB25DF98D9C0B66FB65FB88724F2485BDEE090B246C33AE546C6A1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000A.00000002.742779236.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_17cd000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f7089c09a5f32279a1f06bcf1580f5ea3a389caf2ca641afe76c2e0ee77c905e
                • Instruction ID: eb896714a5e0c775252015617d73efde063834a12c62dcc402d898a67fa0377d
                • Opcode Fuzzy Hash: f7089c09a5f32279a1f06bcf1580f5ea3a389caf2ca641afe76c2e0ee77c905e
                • Instruction Fuzzy Hash: F021E272504240DFDB26DF58E8C0B26FF65FB98718F2485BDE9050A246C336D446C6A1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000A.00000002.742824378.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_17dd000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a3aa943a5d1fadce0e27f501b6dfdf16195ebd912050c2a57cced12b3c3d5000
                • Instruction ID: 6d31a886c045898cc68c9415a551d8348f80eaa827b8fb51b96228922eae0304
                • Opcode Fuzzy Hash: a3aa943a5d1fadce0e27f501b6dfdf16195ebd912050c2a57cced12b3c3d5000
                • Instruction Fuzzy Hash: AE212571604248DFDB25DF58D9C0B16FF75FBC8354F24C5A9D8090B286C33AD806CA61
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000A.00000002.742824378.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_17dd000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: db38cb31cc3e2dd706d021a69119f736eafe1aa4ad7644e5597ef84868d2d61e
                • Instruction ID: 73fe3217ee933a3ac75e5b53dff7137398c866ed1f24be0115c426960caae4d9
                • Opcode Fuzzy Hash: db38cb31cc3e2dd706d021a69119f736eafe1aa4ad7644e5597ef84868d2d61e
                • Instruction Fuzzy Hash: 272192755083849FDB13CF24D994B11BF71EB86214F28C5EAD8498F297C33AD846CB62
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000A.00000002.742779236.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_17cd000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction ID: d533e69549df09c7d6007759ce7fa99704e4fa1c65405a2d0b5f59adb0381242
                • Opcode Fuzzy Hash: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction Fuzzy Hash: DF119D76904280CFDB12CF54E9C4B16BF72FB94724F2486ADD8490B656C33AD456CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 0000000A.00000002.742779236.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_17cd000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction ID: 5bdf7e799b433f495c185a86bc73cf0ffac4d35971dc6c17783cd2f16320ada4
                • Opcode Fuzzy Hash: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction Fuzzy Hash: 4C11CD72404280DFDB12CF44D9C0B56FF72FB84320F2482ADDD090A616C33AE556CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:21.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:69
                Total number of Limit Nodes:2
                execution_graph 4704 fd0448 4705 fd044e 4704->4705 4706 fd0452 4705->4706 4708 fd22b4 4705->4708 4709 fd22cf 4708->4709 4713 fd3db0 4709->4713 4717 fd3da0 4709->4717 4710 fd22dc 4710->4706 4715 fd3dbc 4713->4715 4714 fd3dc6 4714->4710 4715->4714 4721 fd5638 4715->4721 4719 fd3dbc 4717->4719 4718 fd3dc6 4718->4710 4719->4718 4720 fd5638 12 API calls 4719->4720 4720->4719 4722 fd5648 4721->4722 4723 fd56e9 4722->4723 4750 fd5cf8 4722->4750 4754 fd5d00 4722->4754 4730 fd59df 4723->4730 4758 fd61f8 4723->4758 4761 fd61f0 4723->4761 4724 fd5a38 4780 fd64c8 4724->4780 4783 fd64c0 4724->4783 4725 fd5a60 4725->4715 4726 fd57ce 4765 fd62e8 4726->4765 4768 fd62e0 4726->4768 4727 fd584a 4727->4730 4772 fd6390 4727->4772 4776 fd6388 4727->4776 4728 fd58b7 4729 fd59a1 4728->4729 4738 fd6388 WriteProcessMemory 4728->4738 4739 fd6390 WriteProcessMemory 4728->4739 4744 fd6388 WriteProcessMemory 4729->4744 4745 fd6390 WriteProcessMemory 4729->4745 4731 fd5a1b 4730->4731 4787 fd6132 4730->4787 4791 fd6138 4730->4791 4731->4724 4740 fd6138 SetThreadContext 4731->4740 4741 fd6132 SetThreadContext 4731->4741 4738->4728 4739->4728 4740->4724 4741->4724 4744->4730 4745->4730 4751 fd5cfa CreateProcessAsUserA 4750->4751 4753 fd5fa8 4751->4753 4755 fd5d8d CreateProcessAsUserA 4754->4755 4757 fd5fa8 4755->4757 4759 fd6240 ReadProcessMemory 4758->4759 4760 fd627d 4759->4760 4760->4726 4762 fd61f2 4761->4762 4762->4762 4763 fd6240 ReadProcessMemory 4762->4763 4764 fd627d 4763->4764 4764->4726 4766 fd632b VirtualAllocEx 4765->4766 4767 fd6362 4766->4767 4767->4727 4769 fd62e2 4768->4769 4769->4769 4770 fd632b VirtualAllocEx 4769->4770 4771 fd6362 4770->4771 4771->4727 4773 fd63db WriteProcessMemory 4772->4773 4775 fd642c 4773->4775 4775->4728 4778 fd638a WriteProcessMemory 4776->4778 4779 fd642c 4778->4779 4779->4728 4781 fd6509 ResumeThread 4780->4781 4782 fd6536 4781->4782 4782->4725 4784 fd64c2 4783->4784 4784->4784 4785 fd6509 ResumeThread 4784->4785 4786 fd6536 4785->4786 4786->4725 4787->4787 4788 fd6137 SetThreadContext 4787->4788 4790 fd61be 4788->4790 4790->4731 4792 fd6180 SetThreadContext 4791->4792 4794 fd61be 4792->4794 4794->4731

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 fd5cf8 1 fd5cfa-fd5cfd 0->1 1->1 2 fd5cff-fd5d99 1->2 4 fd5ded-fd5e0f 2->4 5 fd5d9b-fd5dc0 2->5 8 fd5e66-fd5e96 4->8 9 fd5e11-fd5e39 4->9 5->4 10 fd5dc2-fd5dc4 5->10 17 fd5e98-fd5ebd 8->17 18 fd5eea-fd5fa6 CreateProcessAsUserA 8->18 9->8 19 fd5e3b-fd5e3d 9->19 11 fd5de7-fd5dea 10->11 12 fd5dc6-fd5dd0 10->12 11->4 14 fd5dd4-fd5de3 12->14 15 fd5dd2 12->15 14->14 20 fd5de5 14->20 15->14 17->18 27 fd5ebf-fd5ec1 17->27 34 fd5faf-fd6023 18->34 35 fd5fa8-fd5fae 18->35 21 fd5e3f-fd5e49 19->21 22 fd5e60-fd5e63 19->22 20->11 24 fd5e4d-fd5e5c 21->24 25 fd5e4b 21->25 22->8 24->24 28 fd5e5e 24->28 25->24 29 fd5ee4-fd5ee7 27->29 30 fd5ec3-fd5ecd 27->30 28->22 29->18 32 fd5ecf 30->32 33 fd5ed1-fd5ee0 30->33 32->33 33->33 36 fd5ee2 33->36 44 fd6025-fd6029 34->44 45 fd6033-fd6037 34->45 35->34 36->29 44->45 48 fd602b 44->48 46 fd6039-fd603d 45->46 47 fd6047-fd604b 45->47 46->47 49 fd603f 46->49 50 fd604d-fd6051 47->50 51 fd605b-fd605f 47->51 48->45 49->47 50->51 52 fd6053 50->52 53 fd6071-fd6078 51->53 54 fd6061-fd6067 51->54 52->51 55 fd608f 53->55 56 fd607a-fd6089 53->56 54->53 57 fd6090 55->57 56->55 57->57
                APIs
                • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FD5F93
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: CreateProcessUser
                • String ID:
                • API String ID: 2217836671-0
                • Opcode ID: 8f80cdcc39f519fa3deb89295e2ee50b26bea53dccec7ce5573f956919eb98be
                • Instruction ID: 6f7f177c6ed99583884a6d937bc31bed019dde1b5f878ec82b21dfb85eaeecee
                • Opcode Fuzzy Hash: 8f80cdcc39f519fa3deb89295e2ee50b26bea53dccec7ce5573f956919eb98be
                • Instruction Fuzzy Hash: 1FA17871E002198FDB10DFA9C8817EDBBB2EF48314F0481AAE819E7391DB759985DF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 59 fd5d00-fd5d99 61 fd5ded-fd5e0f 59->61 62 fd5d9b-fd5dc0 59->62 65 fd5e66-fd5e96 61->65 66 fd5e11-fd5e39 61->66 62->61 67 fd5dc2-fd5dc4 62->67 74 fd5e98-fd5ebd 65->74 75 fd5eea-fd5fa6 CreateProcessAsUserA 65->75 66->65 76 fd5e3b-fd5e3d 66->76 68 fd5de7-fd5dea 67->68 69 fd5dc6-fd5dd0 67->69 68->61 71 fd5dd4-fd5de3 69->71 72 fd5dd2 69->72 71->71 77 fd5de5 71->77 72->71 74->75 84 fd5ebf-fd5ec1 74->84 91 fd5faf-fd6023 75->91 92 fd5fa8-fd5fae 75->92 78 fd5e3f-fd5e49 76->78 79 fd5e60-fd5e63 76->79 77->68 81 fd5e4d-fd5e5c 78->81 82 fd5e4b 78->82 79->65 81->81 85 fd5e5e 81->85 82->81 86 fd5ee4-fd5ee7 84->86 87 fd5ec3-fd5ecd 84->87 85->79 86->75 89 fd5ecf 87->89 90 fd5ed1-fd5ee0 87->90 89->90 90->90 93 fd5ee2 90->93 101 fd6025-fd6029 91->101 102 fd6033-fd6037 91->102 92->91 93->86 101->102 105 fd602b 101->105 103 fd6039-fd603d 102->103 104 fd6047-fd604b 102->104 103->104 106 fd603f 103->106 107 fd604d-fd6051 104->107 108 fd605b-fd605f 104->108 105->102 106->104 107->108 109 fd6053 107->109 110 fd6071-fd6078 108->110 111 fd6061-fd6067 108->111 109->108 112 fd608f 110->112 113 fd607a-fd6089 110->113 111->110 114 fd6090 112->114 113->112 114->114
                APIs
                • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FD5F93
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: CreateProcessUser
                • String ID:
                • API String ID: 2217836671-0
                • Opcode ID: b800717981f4f7e1a2e235ec4a171c64ed31538582ae171ed9a5fb28db5ac35b
                • Instruction ID: 60dc673a7c89d9d67803e9c037b3c7592b02e49f397b708c3925914d3168b402
                • Opcode Fuzzy Hash: b800717981f4f7e1a2e235ec4a171c64ed31538582ae171ed9a5fb28db5ac35b
                • Instruction Fuzzy Hash: 6CA16871E002198FDB10DFA9C8817EDBBB6EF48314F0481AAE818E7391DB759985DF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 116 fd6388-fd6389 117 fd638a-fd638d 116->117 117->117 118 fd638f-fd63e1 117->118 120 fd63f1-fd642a WriteProcessMemory 118->120 121 fd63e3-fd63ef 118->121 122 fd642c-fd6432 120->122 123 fd6433-fd6454 120->123 121->120 122->123
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 00FD641D
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 5facfcfa3e4df41042e3877820e9c76ed4167b3ad8a093171de62e4a70ca886c
                • Instruction ID: a50f372947156063e460e88b9e3197d790eb35e0a8dee739eed1d8877209a04f
                • Opcode Fuzzy Hash: 5facfcfa3e4df41042e3877820e9c76ed4167b3ad8a093171de62e4a70ca886c
                • Instruction Fuzzy Hash: 382122B1900249DFCB10CF9AD885BDEBBF5FB48320F14842AE818A3350D378A941CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 125 fd6390-fd63e1 127 fd63f1-fd642a WriteProcessMemory 125->127 128 fd63e3-fd63ef 125->128 129 fd642c-fd6432 127->129 130 fd6433-fd6454 127->130 128->127 129->130
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 00FD641D
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: e3fd6a5f034b1b2901acc1fb85052f8a0b825271df46a8a61d86cf7e9c7b9249
                • Instruction ID: 3a0773d286253815c4705df0c8f20331f31b752ce60c6cdb9370ddd2fbde5b65
                • Opcode Fuzzy Hash: e3fd6a5f034b1b2901acc1fb85052f8a0b825271df46a8a61d86cf7e9c7b9249
                • Instruction Fuzzy Hash: E121E0B19002599FCB10CF9AD884BDEBBF5FB48320F54842AE918A3351D778A944DBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 132 fd6132-fd6135 132->132 133 fd6137-fd6184 132->133 135 fd6186-fd618e 133->135 136 fd6190-fd61bc SetThreadContext 133->136 135->136 137 fd61be-fd61c4 136->137 138 fd61c5-fd61e6 136->138 137->138
                APIs
                • SetThreadContext.KERNELBASE(?,00000000), ref: 00FD61AF
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: e9b2600d8edae61624ae2159108d1bd0c8e11a6a18387ab7c35fd984da9b50bb
                • Instruction ID: 820344db455eee9412aabb5cf24264a3b1ebb511f5eb17bea166bf00c3a34637
                • Opcode Fuzzy Hash: e9b2600d8edae61624ae2159108d1bd0c8e11a6a18387ab7c35fd984da9b50bb
                • Instruction Fuzzy Hash: AD2113B1D002199FCB00CF9AC8857EEFBF5AB48720F14812AE418A3341D778A9458FA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 140 fd61f0 141 fd61f2-fd61f5 140->141 141->141 142 fd61f7-fd627b ReadProcessMemory 141->142 144 fd627d-fd6283 142->144 145 fd6284-fd62a5 142->145 144->145
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00FD626E
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: caf97b2ea61f7e8109e7b2653ba36ce9248a798f2718e72986c8dae608c320cf
                • Instruction ID: 2477626567ab895a65b45be4aa18e586c0963b6c2dc244868585f778018b5b4c
                • Opcode Fuzzy Hash: caf97b2ea61f7e8109e7b2653ba36ce9248a798f2718e72986c8dae608c320cf
                • Instruction Fuzzy Hash: EB21F7B1900249DFDB10CF9AC984BDEBBF5FB48320F14842AE858A7351D3789545DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 147 fd6138-fd6184 149 fd6186-fd618e 147->149 150 fd6190-fd61bc SetThreadContext 147->150 149->150 151 fd61be-fd61c4 150->151 152 fd61c5-fd61e6 150->152 151->152
                APIs
                • SetThreadContext.KERNELBASE(?,00000000), ref: 00FD61AF
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: dd1e129d2192ebe038aa5c2beeb5e4d1e5ca5e6ee526f30404b11de460b8d45a
                • Instruction ID: 0095e272960b5405eadb1a12bd65168c8f7716ae7cd0557381d5ed46e87119eb
                • Opcode Fuzzy Hash: dd1e129d2192ebe038aa5c2beeb5e4d1e5ca5e6ee526f30404b11de460b8d45a
                • Instruction Fuzzy Hash: 7C21D6B1D006199FCB10CF9AC9857EEFBF4BB48724F54812AE418B3741D778A9448FA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 154 fd61f8-fd627b ReadProcessMemory 156 fd627d-fd6283 154->156 157 fd6284-fd62a5 154->157 156->157
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00FD626E
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: c50cfdbbe48ff38a845492b72d9e217250dc9184112e7ae8a0db052ff746748e
                • Instruction ID: d32c68da360abbacc2a03957a4d92a002de45f7f1aad271386532c06c820acb0
                • Opcode Fuzzy Hash: c50cfdbbe48ff38a845492b72d9e217250dc9184112e7ae8a0db052ff746748e
                • Instruction Fuzzy Hash: 9921D3B5900249DFCB10CF9AC984BDEBBF5FB48320F14842AE958A7351D379A944DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 159 fd62e0-fd62e1 160 fd62e2-fd62e5 159->160 160->160 161 fd62e7-fd6360 VirtualAllocEx 160->161 163 fd6369-fd637d 161->163 164 fd6362-fd6368 161->164 164->163
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00FD6353
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 8a187b2fd713ee9c7dbfc77a935f8af15fa26593f01dada9ace26fbc8738e317
                • Instruction ID: 88ba3327f9249011ec098880d807586e48f60ab03941b9c50421d5ddf6646e8a
                • Opcode Fuzzy Hash: 8a187b2fd713ee9c7dbfc77a935f8af15fa26593f01dada9ace26fbc8738e317
                • Instruction Fuzzy Hash: 441102B59002499FCB10CF9AD884BDEBFF5EB58320F24841AE568A7350D379A945CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 166 fd62e8-fd6360 VirtualAllocEx 168 fd6369-fd637d 166->168 169 fd6362-fd6368 166->169 169->168
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00FD6353
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: fe3c1f0198e78dcf56e53ad91e5c9052f8cb43267c5b6ea8c9d595954435f4c5
                • Instruction ID: ae9d0eeccd94e822fc5cb67eb7969121fdfce7dd77d3843375a9f60f85dd46fb
                • Opcode Fuzzy Hash: fe3c1f0198e78dcf56e53ad91e5c9052f8cb43267c5b6ea8c9d595954435f4c5
                • Instruction Fuzzy Hash: 0311D2B59002499FCB10CF9AD884BDEBFF5EB48320F14841AE528A7350D379A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 171 fd64c0-fd64c1 172 fd64c2-fd64c5 171->172 172->172 173 fd64c7-fd6534 ResumeThread 172->173 175 fd653d-fd6551 173->175 176 fd6536-fd653c 173->176 176->175
                APIs
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: d55079815a1b0c43729a4276c799cd947a591652c9a2059586c096eb1945a93a
                • Instruction ID: dde2dd3a75a2604de239f939e5998f5721b71959d3f623ce06e6c9955d332433
                • Opcode Fuzzy Hash: d55079815a1b0c43729a4276c799cd947a591652c9a2059586c096eb1945a93a
                • Instruction Fuzzy Hash: 5711F2B1D002088FCB10DF9AE484BDEBFF4EB59324F24845AD459A7700D379A985CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 178 fd64c8-fd6534 ResumeThread 180 fd653d-fd6551 178->180 181 fd6536-fd653c 178->181 181->180
                APIs
                Memory Dump Source
                • Source File: 00000012.00000002.499079985.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_18_2_fd0000_svchost.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 7c70e15ad95ebdcaa0382957c9d2d935c34fe73d2df85be6e8df3bff93d3ff34
                • Instruction ID: 55304c756d8b9ba51c24b83fb44fb0d45c45818d188d90554e159ac4254bdd46
                • Opcode Fuzzy Hash: 7c70e15ad95ebdcaa0382957c9d2d935c34fe73d2df85be6e8df3bff93d3ff34
                • Instruction Fuzzy Hash: BF1100B1800208CFCB10DF9AE484BDEBBF8EB48324F24845AD418A3300C379A984CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:11.5%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:317
                Total number of Limit Nodes:22
                execution_graph 26107 5b2b130 GetCurrentProcess 26108 5b2b1a3 26107->26108 26109 5b2b1aa GetCurrentThread 26107->26109 26108->26109 26110 5b2b1e0 26109->26110 26111 5b2b1e7 GetCurrentProcess 26109->26111 26110->26111 26112 5b2b21d 26111->26112 26113 5b2b245 GetCurrentThreadId 26112->26113 26114 5b2b276 26113->26114 26115 5b28d50 26119 5b28e38 26115->26119 26127 5b28e48 26115->26127 26116 5b28d5f 26120 5b28e5b 26119->26120 26121 5b28e73 26120->26121 26135 5b290d0 26120->26135 26139 5b290c0 26120->26139 26121->26116 26122 5b28e6b 26122->26121 26123 5b29070 GetModuleHandleW 26122->26123 26124 5b2909d 26123->26124 26124->26116 26128 5b28e5b 26127->26128 26130 5b28e73 26128->26130 26133 5b290d0 LoadLibraryExW 26128->26133 26134 5b290c0 LoadLibraryExW 26128->26134 26129 5b28e6b 26129->26130 26131 5b29070 GetModuleHandleW 26129->26131 26130->26116 26132 5b2909d 26131->26132 26132->26116 26133->26129 26134->26129 26136 5b290e4 26135->26136 26137 5b29109 26136->26137 26143 5b281c8 26136->26143 26137->26122 26140 5b290e4 26139->26140 26141 5b29109 26140->26141 26142 5b281c8 LoadLibraryExW 26140->26142 26141->26122 26142->26141 26144 5b292b0 LoadLibraryExW 26143->26144 26146 5b29329 26144->26146 26146->26137 26254 5b2b760 DuplicateHandle 26255 5b2b7f6 26254->26255 26256 1aad01c 26257 1aad034 26256->26257 26258 1aad08e 26257->26258 26261 5bf06e8 26257->26261 26266 5bf06d8 26257->26266 26262 5bf0715 26261->26262 26263 5bf0747 26262->26263 26271 5bf0870 26262->26271 26275 5bf0860 26262->26275 26267 5bf0715 26266->26267 26268 5bf0747 26267->26268 26269 5bf0870 4 API calls 26267->26269 26270 5bf0860 4 API calls 26267->26270 26269->26268 26270->26268 26272 5bf0884 26271->26272 26279 5bf0928 26272->26279 26273 5bf0910 26273->26263 26276 5bf0884 26275->26276 26278 5bf0928 4 API calls 26276->26278 26277 5bf0910 26277->26263 26278->26277 26280 5bf0939 26279->26280 26284 5bf4f08 26279->26284 26293 5bf4f00 26279->26293 26303 5bf4f10 26279->26303 26280->26273 26285 5bf4f58 26284->26285 26286 5bf4f21 26284->26286 26322 5bf4b08 26285->26322 26288 5bf4f34 26286->26288 26312 5bf4f78 26286->26312 26317 5bf4f87 26286->26317 26288->26280 26289 5bf4f5d 26289->26280 26290 5bf4f31 26290->26280 26294 5bf4f0c 26293->26294 26295 5bf4f58 26294->26295 26296 5bf4f21 26294->26296 26297 5bf4b08 2 API calls 26295->26297 26300 5bf4f34 26296->26300 26301 5bf4f78 2 API calls 26296->26301 26302 5bf4f87 2 API calls 26296->26302 26298 5bf4f5d 26297->26298 26298->26280 26299 5bf4f31 26299->26280 26300->26280 26301->26299 26302->26299 26304 5bf4f58 26303->26304 26305 5bf4f21 26303->26305 26307 5bf4b08 2 API calls 26304->26307 26306 5bf4f34 26305->26306 26310 5bf4f78 2 API calls 26305->26310 26311 5bf4f87 2 API calls 26305->26311 26306->26280 26309 5bf4f5d 26307->26309 26308 5bf4f31 26308->26280 26309->26280 26310->26308 26311->26308 26313 5bf4f84 26312->26313 26314 5bf50ee 26313->26314 26328 5bf5718 26313->26328 26334 5bf5717 26313->26334 26314->26290 26318 5bf4fa1 26317->26318 26319 5bf50ee 26318->26319 26320 5bf5718 2 API calls 26318->26320 26321 5bf5717 2 API calls 26318->26321 26319->26290 26320->26319 26321->26319 26323 5bf4b13 26322->26323 26379 5bf9fef 26323->26379 26388 5bf9fe8 26323->26388 26397 5bf9ff8 26323->26397 26324 5bf9f14 26324->26289 26329 5bf572a 26328->26329 26330 5bf5723 26328->26330 26340 5bf5748 26329->26340 26348 5bf5747 26329->26348 26330->26314 26331 5bf5730 26331->26314 26335 5bf572a 26334->26335 26336 5bf5723 26334->26336 26338 5bf5748 2 API calls 26335->26338 26339 5bf5747 2 API calls 26335->26339 26336->26314 26337 5bf5730 26337->26314 26338->26337 26339->26337 26341 5bf5778 26340->26341 26342 5bf5756 26340->26342 26343 5bf12e0 2 API calls 26341->26343 26345 5bf5764 26342->26345 26356 5bf12e0 26342->26356 26347 5bf577f 26343->26347 26345->26331 26346 5bf57a0 26346->26331 26347->26331 26349 5bf5778 26348->26349 26350 5bf5756 26348->26350 26351 5bf12e0 2 API calls 26349->26351 26352 5bf12e0 2 API calls 26350->26352 26353 5bf5764 26350->26353 26355 5bf577f 26351->26355 26354 5bf57a0 26352->26354 26353->26331 26354->26331 26355->26331 26358 5bf132c 26356->26358 26357 5bf1599 26357->26346 26358->26357 26361 5bf57b8 26358->26361 26366 5bf57a8 26358->26366 26362 5bf57fe 26361->26362 26363 5bf5821 26362->26363 26371 5bf1f70 26362->26371 26375 5bf1f40 26362->26375 26363->26357 26367 5bf57b8 26366->26367 26368 5bf5821 26367->26368 26369 5bf1f70 CallWindowProcW 26367->26369 26370 5bf1f40 CallWindowProcW 26367->26370 26368->26357 26369->26368 26370->26368 26372 5bf1fb2 26371->26372 26374 5bf1fb9 26371->26374 26373 5bf200a CallWindowProcW 26372->26373 26372->26374 26373->26374 26374->26363 26376 5bf1fb2 26375->26376 26378 5bf1fb9 26375->26378 26377 5bf200a CallWindowProcW 26376->26377 26376->26378 26377->26378 26378->26363 26380 5bf9ff8 26379->26380 26406 5bfa0d8 26380->26406 26382 5bfa047 26382->26324 26383 5bfa029 26383->26324 26389 5bf9ff4 26388->26389 26393 5bfa0d8 OleInitialize 26389->26393 26390 5bfa025 26392 5bfa029 26390->26392 26394 5bfa5ff OleGetClipboard 26390->26394 26395 5bfa5f0 OleGetClipboard 26390->26395 26396 5bfa600 OleGetClipboard 26390->26396 26391 5bfa047 26391->26324 26392->26324 26393->26390 26394->26391 26395->26391 26396->26391 26398 5bfa010 26397->26398 26402 5bfa0d8 OleInitialize 26398->26402 26399 5bfa025 26401 5bfa029 26399->26401 26403 5bfa5ff OleGetClipboard 26399->26403 26404 5bfa5f0 OleGetClipboard 26399->26404 26405 5bfa600 OleGetClipboard 26399->26405 26400 5bfa047 26400->26324 26401->26324 26402->26399 26403->26400 26404->26400 26405->26400 26407 5bfa0f0 26406->26407 26408 5bf9264 OleInitialize 26407->26408 26409 5bfa025 26408->26409 26409->26383 26410 5bfa5f0 26409->26410 26414 5bfa600 26409->26414 26418 5bfa5ff 26409->26418 26412 5bfa5fc 26410->26412 26413 5bfa63b 26412->26413 26422 5bf928c 26412->26422 26413->26382 26416 5bfa615 26414->26416 26415 5bf928c OleGetClipboard 26415->26416 26416->26415 26417 5bfa63b 26416->26417 26417->26382 26420 5bfa615 26418->26420 26419 5bf928c OleGetClipboard 26419->26420 26420->26419 26421 5bfa63b 26420->26421 26421->26382 26423 5bfa6a8 OleGetClipboard 26422->26423 26425 5bfa742 26423->26425 26426 5bf6868 26428 5bf6879 26426->26428 26427 5bf68e3 26428->26427 26431 5bf5ce8 26428->26431 26432 5bf5cf3 26431->26432 26433 5bf68dc 26432->26433 26437 5bf8008 26432->26437 26443 5bf8007 26432->26443 26449 5bf7ff8 26432->26449 26456 5bf6c6c 26437->26456 26440 5bf802f 26440->26433 26441 5bf8058 CreateIconFromResourceEx 26442 5bf80d6 26441->26442 26442->26433 26444 5bf8022 26443->26444 26445 5bf6c6c CreateIconFromResourceEx 26443->26445 26446 5bf802f 26444->26446 26447 5bf8058 CreateIconFromResourceEx 26444->26447 26445->26444 26446->26433 26448 5bf80d6 26447->26448 26448->26433 26450 5bf8004 26449->26450 26451 5bf8022 26450->26451 26452 5bf6c6c CreateIconFromResourceEx 26450->26452 26453 5bf802f 26451->26453 26454 5bf8058 CreateIconFromResourceEx 26451->26454 26452->26451 26453->26433 26455 5bf80d6 26454->26455 26455->26433 26457 5bf8058 CreateIconFromResourceEx 26456->26457 26458 5bf8022 26457->26458 26458->26440 26458->26441 26147 5b24378 26148 5b24386 26147->26148 26154 5b23db0 26148->26154 26155 5b23dbb 26154->26155 26166 5b24034 26155->26166 26157 5b2438f 26158 5bf3af0 26157->26158 26162 5bf3b00 26157->26162 26159 5bf3b00 26158->26159 26216 5bf2fc4 26159->26216 26163 5bf3b12 26162->26163 26164 5bf2fc4 3 API calls 26163->26164 26165 5b24397 26164->26165 26167 5b2403f 26166->26167 26170 5b24044 26167->26170 26169 5b2444d 26169->26157 26171 5b2404f 26170->26171 26174 5b24074 26171->26174 26173 5b24522 26173->26169 26175 5b2407f 26174->26175 26178 5b240a4 26175->26178 26177 5b24631 26177->26173 26180 5b240af 26178->26180 26179 5b26c04 26179->26177 26180->26179 26182 5b2ae58 26180->26182 26183 5b2ae89 26182->26183 26184 5b2aead 26183->26184 26187 5b2b018 26183->26187 26191 5b2b008 26183->26191 26184->26179 26189 5b2b025 26187->26189 26188 5b2b05f 26188->26184 26189->26188 26195 5b29b4c 26189->26195 26192 5b2b025 26191->26192 26193 5b2b05f 26192->26193 26194 5b29b4c 2 API calls 26192->26194 26193->26184 26194->26193 26196 5b29b57 26195->26196 26198 5b2bd58 26196->26198 26199 5b2b364 26196->26199 26200 5b2b36f 26199->26200 26201 5b240a4 2 API calls 26200->26201 26202 5b2bdc7 26201->26202 26206 5b2db38 26202->26206 26211 5b2db50 26202->26211 26203 5b2be00 26203->26198 26207 5b2db45 26206->26207 26208 5b2db8d 26207->26208 26209 5b2de98 LoadLibraryExW GetModuleHandleW 26207->26209 26210 5b2de88 LoadLibraryExW GetModuleHandleW 26207->26210 26208->26203 26209->26208 26210->26208 26212 5b2db81 26211->26212 26213 5b2db8d 26211->26213 26212->26213 26214 5b2de98 LoadLibraryExW GetModuleHandleW 26212->26214 26215 5b2de88 LoadLibraryExW GetModuleHandleW 26212->26215 26213->26203 26214->26213 26215->26213 26217 5bf2fcf 26216->26217 26220 5bf3004 26217->26220 26225 5bf300f 26220->26225 26221 5bf42c3 26226 5bf42ee 26221->26226 26229 5bf3dac 26221->26229 26222 5bf3dac OleInitialize 26222->26221 26225->26221 26225->26222 26225->26226 26231 5bf3db7 26229->26231 26230 5bf42db 26234 5bfd197 26230->26234 26238 5bfd198 26230->26238 26231->26230 26242 5bf9264 26231->26242 26233 5bfcd44 26236 5bfd1fd 26234->26236 26235 5bfd24a 26235->26226 26236->26235 26237 5bfd660 WaitMessage 26236->26237 26237->26236 26240 5bfd1fd 26238->26240 26239 5bfd660 WaitMessage 26239->26240 26240->26239 26241 5bfd24a 26240->26241 26241->26226 26243 5bf926f 26242->26243 26245 5bfa12b 26243->26245 26246 5bf9274 26243->26246 26245->26233 26247 5bfa160 OleInitialize 26246->26247 26249 5bfa1c4 26247->26249 26249->26245 26250 5b2f658 26251 5b2f6c0 CreateWindowExW 26250->26251 26253 5b2f77c 26251->26253 26459 5bf5920 26460 5bf5718 2 API calls 26459->26460 26461 5bf592e 26460->26461 26462 5bf4500 26468 5bf454f 26462->26468 26475 5bf4558 26462->26475 26463 5bf4510 26464 5bf3dfc KiUserCallbackDispatcher 26463->26464 26465 5bf4530 26464->26465 26469 5bf4591 26468->26469 26471 5bf462f 26469->26471 26473 5b2db50 2 API calls 26469->26473 26474 5b2db38 2 API calls 26469->26474 26482 5bf3f08 26471->26482 26472 5bf46a5 26473->26471 26474->26471 26476 5bf4591 26475->26476 26477 5bf462f 26476->26477 26480 5b2db50 2 API calls 26476->26480 26481 5b2db38 2 API calls 26476->26481 26478 5bf3f08 5 API calls 26477->26478 26479 5bf46a5 26478->26479 26480->26477 26481->26477 26483 5bf3f13 26482->26483 26485 5bf6681 26483->26485 26487 5bf66d4 26483->26487 26494 5bf5c64 CreateIconFromResourceEx SendMessageW CreateIconFromResourceEx CreateIconFromResourceEx CreateIconFromResourceEx 26483->26494 26484 5bf66ba 26486 5bf5c74 SendMessageW 26484->26486 26485->26484 26490 5bf5c74 26485->26490 26486->26487 26487->26472 26491 5bf5c7f 26490->26491 26495 5bf6cb0 26491->26495 26494->26485 26496 5bf83d0 SendMessageW 26495->26496 26497 5bf83b9 26496->26497 26497->26484 26498 5bf9820 26499 5bf9830 26498->26499 26500 5bf5718 2 API calls 26499->26500 26501 5bf9839 26500->26501

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 42 5bfd198-5bfd1fb 43 5bfd1fd-5bfd227 42->43 44 5bfd22a-5bfd248 42->44 43->44 49 5bfd24a-5bfd24c 44->49 50 5bfd251-5bfd288 44->50 52 5bfd70a-5bfd71f 49->52 54 5bfd28e-5bfd2a2 50->54 55 5bfd6b9 50->55 56 5bfd2a4-5bfd2ce 54->56 57 5bfd2d1-5bfd2f0 54->57 58 5bfd6be-5bfd6d4 55->58 56->57 64 5bfd308-5bfd30a 57->64 65 5bfd2f2-5bfd2f8 57->65 58->52 69 5bfd30c-5bfd324 64->69 70 5bfd329-5bfd332 64->70 67 5bfd2fc-5bfd2fe 65->67 68 5bfd2fa 65->68 67->64 68->64 69->58 71 5bfd33a-5bfd341 70->71 72 5bfd34b-5bfd352 71->72 73 5bfd343-5bfd349 71->73 75 5bfd35c 72->75 76 5bfd354-5bfd35a 72->76 74 5bfd35f-5bfd37c call 5bfbe58 73->74 79 5bfd382-5bfd389 74->79 80 5bfd4d1-5bfd4d5 74->80 75->74 76->74 79->55 83 5bfd38f-5bfd3cc 79->83 81 5bfd4db-5bfd4df 80->81 82 5bfd6a4-5bfd6b7 80->82 84 5bfd4f9-5bfd502 81->84 85 5bfd4e1-5bfd4f4 81->85 82->58 91 5bfd69a-5bfd69e 83->91 92 5bfd3d2-5bfd3d7 83->92 86 5bfd504-5bfd52e 84->86 87 5bfd531-5bfd538 84->87 85->58 86->87 89 5bfd53e-5bfd545 87->89 90 5bfd5d7-5bfd5ec 87->90 94 5bfd547-5bfd571 89->94 95 5bfd574-5bfd596 89->95 90->91 105 5bfd5f2-5bfd5f4 90->105 91->71 91->82 96 5bfd409-5bfd41e call 5bfbe7c 92->96 97 5bfd3d9-5bfd3e7 call 5bfbe64 92->97 94->95 95->90 132 5bfd598-5bfd5a2 95->132 103 5bfd423-5bfd427 96->103 97->96 107 5bfd3e9-5bfd402 call 5bfbe70 97->107 108 5bfd429-5bfd43b call 5bfbe88 103->108 109 5bfd498-5bfd4a5 103->109 110 5bfd5f6-5bfd62f 105->110 111 5bfd641-5bfd65e call 5bfbe58 105->111 117 5bfd407 107->117 135 5bfd43d-5bfd46d 108->135 136 5bfd47b-5bfd493 108->136 109->91 124 5bfd4ab-5bfd4ae call 5bfbe98 109->124 127 5bfd638-5bfd63f 110->127 128 5bfd631-5bfd637 110->128 111->91 123 5bfd660-5bfd68c WaitMessage 111->123 117->103 129 5bfd68e 123->129 130 5bfd693 123->130 134 5bfd4b3-5bfd4b5 124->134 127->91 128->127 129->130 130->91 143 5bfd5ba-5bfd5d5 132->143 144 5bfd5a4-5bfd5aa 132->144 138 5bfd4b7-5bfd4bf call 5bfbea4 134->138 139 5bfd4c4-5bfd4cc call 5bfbeb0 134->139 150 5bfd46f 135->150 151 5bfd474 135->151 136->58 138->91 139->91 143->90 143->132 148 5bfd5ae-5bfd5b0 144->148 149 5bfd5ac 144->149 148->143 149->143 150->151 151->136
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 983139241edbf5f1f3fd03e3742f7efdcabea239fa787c9429fa5080141cc6ea
                • Instruction ID: a00ad05314aa2f6e3c09a0d4ebfd1457b84fe687bef30b037a7193e1a3ede9ea
                • Opcode Fuzzy Hash: 983139241edbf5f1f3fd03e3742f7efdcabea239fa787c9429fa5080141cc6ea
                • Instruction Fuzzy Hash: AFF15C31A00209CFDB14DFA9C944BADBBF2FF88314F158598E509AF2A5DB74A949CF40
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • GetCurrentProcess.KERNEL32 ref: 05B2B190
                • GetCurrentThread.KERNEL32 ref: 05B2B1CD
                • GetCurrentProcess.KERNEL32 ref: 05B2B20A
                • GetCurrentThreadId.KERNEL32 ref: 05B2B263
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: 48005f4a510efa1a593986d5ca5e5a56a12decbf010bab87fe66c31403954350
                • Instruction ID: 04ec68f9f8d80394d33860df22f668382e0c47afc3f87d0690255ae0d37f2ee8
                • Opcode Fuzzy Hash: 48005f4a510efa1a593986d5ca5e5a56a12decbf010bab87fe66c31403954350
                • Instruction Fuzzy Hash: A15111B19006498FDB14CFAAD58879EBFF1FB88314F20849AE419B7350DB786844CF65
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • GetCurrentProcess.KERNEL32 ref: 05B2B190
                • GetCurrentThread.KERNEL32 ref: 05B2B1CD
                • GetCurrentProcess.KERNEL32 ref: 05B2B20A
                • GetCurrentThreadId.KERNEL32 ref: 05B2B263
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: 6c5183965867c3ff867036afad4ef869f46a25510e2ba1e8c5114a567b67e75d
                • Instruction ID: 7db8cf64d9b0b28cf405203320beb5c127a7cdbd034d73fd1aec4f9d52b1a5bb
                • Opcode Fuzzy Hash: 6c5183965867c3ff867036afad4ef869f46a25510e2ba1e8c5114a567b67e75d
                • Instruction Fuzzy Hash: FD5123B19002498FDB14CFAAD58879EBFF1FB88314F208499E419B7350DB786844CF65
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 154 5b28e48-5b28e50 155 5b28e5b-5b28e5d 154->155 156 5b28e56 call 5b28160 154->156 157 5b28e73-5b28e77 155->157 158 5b28e5f 155->158 156->155 159 5b28e8b-5b28ecc 157->159 160 5b28e79-5b28e83 157->160 209 5b28e65 call 5b290d0 158->209 210 5b28e65 call 5b290c0 158->210 165 5b28ed9-5b28ee7 159->165 166 5b28ece-5b28ed6 159->166 160->159 161 5b28e6b-5b28e6d 161->157 162 5b28fa8-5b29068 161->162 202 5b29070-5b2909b GetModuleHandleW 162->202 203 5b2906a-5b2906d 162->203 167 5b28f0b-5b28f0d 165->167 168 5b28ee9-5b28eee 165->168 166->165 172 5b28f10-5b28f17 167->172 170 5b28ef0-5b28ef7 call 5b2816c 168->170 171 5b28ef9 168->171 174 5b28efb-5b28f09 170->174 171->174 175 5b28f24-5b28f2b 172->175 176 5b28f19-5b28f21 172->176 174->172 179 5b28f38-5b28f41 call 5b2817c 175->179 180 5b28f2d-5b28f35 175->180 176->175 185 5b28f43-5b28f4b 179->185 186 5b28f4e-5b28f53 179->186 180->179 185->186 187 5b28f71-5b28f75 186->187 188 5b28f55-5b28f5c 186->188 207 5b28f78 call 5b293c8 187->207 208 5b28f78 call 5b293b9 187->208 188->187 189 5b28f5e-5b28f6e call 5b2818c call 5b2819c 188->189 189->187 192 5b28f7b-5b28f7e 195 5b28f80-5b28f9e 192->195 196 5b28fa1-5b28fa7 192->196 195->196 204 5b290a4-5b290b8 202->204 205 5b2909d-5b290a3 202->205 203->202 205->204 207->192 208->192 209->161 210->161
                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 05B2908E
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: 9c2979e06dc9c9b18c4cab1d0e6b924f4316cc822f37fa0f5b5a72587cc23b77
                • Instruction ID: 74908de5a35b3f2987e88c5dccd1bd8fefed93809ddab5f29d9c4c8d3afb10cf
                • Opcode Fuzzy Hash: 9c2979e06dc9c9b18c4cab1d0e6b924f4316cc822f37fa0f5b5a72587cc23b77
                • Instruction Fuzzy Hash: 6D713570A00B158FD724DF6AD55476ABBF2FF88200F00896AE48AD7B50DB34F8458FA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 211 5b2f64c-5b2f6be 213 5b2f6c0-5b2f6c6 211->213 214 5b2f6c9-5b2f6d0 211->214 213->214 215 5b2f6d2-5b2f6d8 214->215 216 5b2f6db-5b2f713 214->216 215->216 217 5b2f71b-5b2f77a CreateWindowExW 216->217 218 5b2f783-5b2f7bb 217->218 219 5b2f77c-5b2f782 217->219 223 5b2f7c8 218->223 224 5b2f7bd-5b2f7c0 218->224 219->218 225 5b2f7c9 223->225 224->223 225->225
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05B2F76A
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: 8c2afa1e88347551ffa9179469770d3a374ab78c16d77a25ae6f7f73d29b7f20
                • Instruction ID: 9f91f0388750651fcc7ba318f82b4434c1b2bd7175f9782a9a4aecf699fa2b5c
                • Opcode Fuzzy Hash: 8c2afa1e88347551ffa9179469770d3a374ab78c16d77a25ae6f7f73d29b7f20
                • Instruction Fuzzy Hash: 4B51C2B1D00319DFDB15CF9AC884ADEBBB5FF48310F24866AE419AB210D774A845CF90
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 226 5b2f658-5b2f6be 227 5b2f6c0-5b2f6c6 226->227 228 5b2f6c9-5b2f6d0 226->228 227->228 229 5b2f6d2-5b2f6d8 228->229 230 5b2f6db-5b2f77a CreateWindowExW 228->230 229->230 232 5b2f783-5b2f7bb 230->232 233 5b2f77c-5b2f782 230->233 237 5b2f7c8 232->237 238 5b2f7bd-5b2f7c0 232->238 233->232 239 5b2f7c9 237->239 238->237 239->239
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05B2F76A
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID:
                • API String ID: 716092398-0
                • Opcode ID: d2766076d76044916ec6eec87921c2d2196d98831bcc1043016fac9c6fefcfe2
                • Instruction ID: 0453cabe1277ecc6d01bebbfee6d3647f966a00f65da8c8f0a0c69df3a021a62
                • Opcode Fuzzy Hash: d2766076d76044916ec6eec87921c2d2196d98831bcc1043016fac9c6fefcfe2
                • Instruction Fuzzy Hash: 0941B2B1D00319DFDB15CF9AC884ADEBBB5FF48310F24866AE419AB210D774A945CF90
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 240 5bf1f70-5bf1fac 241 5bf205c-5bf207c 240->241 242 5bf1fb2-5bf1fb7 240->242 248 5bf207f-5bf208c 241->248 243 5bf200a-5bf2042 CallWindowProcW 242->243 244 5bf1fb9-5bf1ff0 242->244 245 5bf204b-5bf205a 243->245 246 5bf2044-5bf204a 243->246 251 5bf1ff9-5bf2008 244->251 252 5bf1ff2-5bf1ff8 244->252 245->248 246->245 251->248 252->251
                APIs
                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05BF2031
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: CallProcWindow
                • String ID:
                • API String ID: 2714655100-0
                • Opcode ID: 37e81e2be47f6a701b0c7e5bbd4d4e732c4205dc33ac9d2b984c47f49cc4ab78
                • Instruction ID: bcdfb84915eca3101907078f99f931f02066a5dfd04e192507e9f81169f597b3
                • Opcode Fuzzy Hash: 37e81e2be47f6a701b0c7e5bbd4d4e732c4205dc33ac9d2b984c47f49cc4ab78
                • Instruction Fuzzy Hash: 32415EB9900205CFCB14CF99C448AAAFBF5FF88314F24C499E519A7321D774A945CFA0
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 254 5bf8008-5bf802d call 5bf6c6c 257 5bf802f-5bf803f call 5bf7ac8 254->257 258 5bf8042-5bf80d4 CreateIconFromResourceEx 254->258 263 5bf80dd-5bf80fa 258->263 264 5bf80d6-5bf80dc 258->264 264->263
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: CreateFromIconResource
                • String ID:
                • API String ID: 3668623891-0
                • Opcode ID: 6095783f2219c4ba2a44dac36ac3ae6537abb6850bf825e42549288e8f4df774
                • Instruction ID: ab79bdb8bcc154349e0a4c137d36975064d63038448383282181589fbca66f14
                • Opcode Fuzzy Hash: 6095783f2219c4ba2a44dac36ac3ae6537abb6850bf825e42549288e8f4df774
                • Instruction Fuzzy Hash: 27318D729043499FCB11DFA9C844AEEBFF9EF49310F14809AF954A7221C335A954DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 267 5bf928c-5bfa740 OleGetClipboard 270 5bfa749-5bfa75a 267->270 271 5bfa742-5bfa748 267->271 272 5bfa764-5bfa797 270->272 271->270 276 5bfa799-5bfa79d 272->276 277 5bfa7a7 272->277 276->277 278 5bfa79f 276->278 279 5bfa7a8 277->279 278->277 279->279
                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: Clipboard
                • String ID:
                • API String ID: 220874293-0
                • Opcode ID: 83c74a99d4730700563aab56f52156e64efb9ef0cb15b491735e6952c8fe5e0a
                • Instruction ID: 4b96c71e982ea3e864d22644fbde70a2c57d0b8de063733eb97ca0dd04ea9ef3
                • Opcode Fuzzy Hash: 83c74a99d4730700563aab56f52156e64efb9ef0cb15b491735e6952c8fe5e0a
                • Instruction Fuzzy Hash: A231E4B0D01208DFDB14DF99C984BDDBBF6AF48314F248059E508BB390D7B46949CB55
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 280 5bfa6a5-5bfa6f8 281 5bfa702-5bfa740 OleGetClipboard 280->281 282 5bfa749-5bfa75a 281->282 283 5bfa742-5bfa748 281->283 284 5bfa764-5bfa797 282->284 283->282 288 5bfa799-5bfa79d 284->288 289 5bfa7a7 284->289 288->289 290 5bfa79f 288->290 291 5bfa7a8 289->291 290->289 291->291
                APIs
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: Clipboard
                • String ID:
                • API String ID: 220874293-0
                • Opcode ID: 92a3ab5c502ba50108a99c78a5018cb17f25d7aa4f2cf2211e262354dde6ca97
                • Instruction ID: 8cc859a3457de1e67cdfad3ead4d54c944fc02389698087fdcc9ea18b2c04ff7
                • Opcode Fuzzy Hash: 92a3ab5c502ba50108a99c78a5018cb17f25d7aa4f2cf2211e262354dde6ca97
                • Instruction Fuzzy Hash: 8C31DEB4D01208DFDB14CF99C988BDDBBB6AB48314F248059E008BB390D7B46949CF61
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 297 5b2b760-5b2b7f4 DuplicateHandle 298 5b2b7f6-5b2b7fc 297->298 299 5b2b7fd-5b2b81a 297->299 298->299
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05B2B7E7
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 8ee75b9fc75df1ec89d399c85fed582f23ed8eeea60888d666e9526c10d987ee
                • Instruction ID: e7ba668ac6b7b1e02ec772a471401bad7cdbdd112d0b3287b2d4def7dd4b2fd1
                • Opcode Fuzzy Hash: 8ee75b9fc75df1ec89d399c85fed582f23ed8eeea60888d666e9526c10d987ee
                • Instruction Fuzzy Hash: B321C4B5D002599FDB10CF9AD584ADEBBF9FB48320F14845AE918B3310D778A944CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 292 5b2b758-5b2b7f4 DuplicateHandle 293 5b2b7f6-5b2b7fc 292->293 294 5b2b7fd-5b2b81a 292->294 293->294
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05B2B7E7
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: a3c1f57480932baaddab0d80dc2c3013f4ce50d77b77715479989b8da9c2517d
                • Instruction ID: 4bc5a7213e69423e77bd7aa13977124dc7fb62d6037c1a0ede056e294011ce62
                • Opcode Fuzzy Hash: a3c1f57480932baaddab0d80dc2c3013f4ce50d77b77715479989b8da9c2517d
                • Instruction Fuzzy Hash: 3721D2B6D002199FDB10CFAAD584AEEBBF5FB48310F14845AE918B3310D378A944DFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 302 5bf6c6c-5bf80d4 CreateIconFromResourceEx 304 5bf80dd-5bf80fa 302->304 305 5bf80d6-5bf80dc 302->305 305->304
                APIs
                • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,05BF8022,?,?,?,?,?), ref: 05BF80C7
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: CreateFromIconResource
                • String ID:
                • API String ID: 3668623891-0
                • Opcode ID: 8bb664dcc6c8c2319f85443802053a2512461d057db0bb8537a7fe2cc9367501
                • Instruction ID: 56de5b5ba512c3aa6ae31bd16bac7afdd2a96db3766ff53dbd2da0d59abcb528
                • Opcode Fuzzy Hash: 8bb664dcc6c8c2319f85443802053a2512461d057db0bb8537a7fe2cc9367501
                • Instruction Fuzzy Hash: 0E115C719002499FCB10CFAAC844BEEBFF9EB48310F14845AE914A7210C375A954DFA0
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 308 5b281c8-5b292f0 310 5b292f2-5b292f5 308->310 311 5b292f8-5b29327 LoadLibraryExW 308->311 310->311 312 5b29330-5b2934d 311->312 313 5b29329-5b2932f 311->313 313->312
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,05B29109,00000800,00000000,00000000), ref: 05B2931A
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 0d573022ebf202607bede9292956ce4909171f1ac867f022d4553d05d4ed3056
                • Instruction ID: 484dbe600a00528713c07bbbf2388abc70805ae77d4831ead5966ab7b7b0dda7
                • Opcode Fuzzy Hash: 0d573022ebf202607bede9292956ce4909171f1ac867f022d4553d05d4ed3056
                • Instruction Fuzzy Hash: 2711F2B69002588FCB10CF9AC484ADEBBF5EB48310F14846AE819A7200C378A585CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 316 5b292a9-5b292f0 317 5b292f2-5b292f5 316->317 318 5b292f8-5b29327 LoadLibraryExW 316->318 317->318 319 5b29330-5b2934d 318->319 320 5b29329-5b2932f 318->320 320->319
                APIs
                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,05B29109,00000800,00000000,00000000), ref: 05B2931A
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: 58cb298890cf6872151369aeedb6e8b637e61592d36b18020a238fc78b1257da
                • Instruction ID: 29f0ee18eaf171d51e73ea7c2e55ee855b022af9714564adc580c0366394fb47
                • Opcode Fuzzy Hash: 58cb298890cf6872151369aeedb6e8b637e61592d36b18020a238fc78b1257da
                • Instruction Fuzzy Hash: D61114B6D002598FCB10CF9AC584BDEFBF5AB48310F14845AD419B7300C378A545CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • GetModuleHandleW.KERNELBASE(00000000), ref: 05B2908E
                Memory Dump Source
                • Source File: 00000013.00000002.743977792.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5b20000_svchost.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: da1f6cc197f60c66dc945ca6adc81502bca5f8b2bcb36814cb09da9f36ab779a
                • Instruction ID: ef13a198eb508904f5c0f704bf13ae5332ab8a4b2ca3419ea86348a627fc11f1
                • Opcode Fuzzy Hash: da1f6cc197f60c66dc945ca6adc81502bca5f8b2bcb36814cb09da9f36ab779a
                • Instruction Fuzzy Hash: D01102B6C002598FDB10CF9AC444BDFFBF4EB88224F10855AD429A7210C379A585CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 05BF842D
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: MessageSend
                • String ID:
                • API String ID: 3850602802-0
                • Opcode ID: 0f1066eb2dc9902e5a923e8b9e160aea5dca461bca28f754cddf7acc0884ab46
                • Instruction ID: 59c254de248f5abcee36bd9d979e6199f59d40332ff574c495784a6270adf73b
                • Opcode Fuzzy Hash: 0f1066eb2dc9902e5a923e8b9e160aea5dca461bca28f754cddf7acc0884ab46
                • Instruction Fuzzy Hash: EB11F5B58002489FDB10DF9AD484BDEBFF8EB48320F108459E955A7700D374A944CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • OleInitialize.OLE32(00000000), ref: 05BFA1B5
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: e28f901014e68706346c8b6ee6c729a497d39c5c55e4dc5ad8611d2e7456258d
                • Instruction ID: 458efe19c43406bbfe379f3de5958f55aefa9031832af57c3e41d114d5b6a104
                • Opcode Fuzzy Hash: e28f901014e68706346c8b6ee6c729a497d39c5c55e4dc5ad8611d2e7456258d
                • Instruction Fuzzy Hash: 791115B59043488FCB20DF9AC484BDEBBF4EB48324F208499E519B7310D378A948CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,05BF4530), ref: 05BF9EBF
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: CallbackDispatcherUser
                • String ID:
                • API String ID: 2492992576-0
                • Opcode ID: 9bc61279def94e82c356d5852e3b62e7b98a0c57949f79e2bc1b04624c59c953
                • Instruction ID: 75229a52a34f337a004f0f0a08c0b9fc45fa0c91cda5ccdc4828cf139b3725a5
                • Opcode Fuzzy Hash: 9bc61279def94e82c356d5852e3b62e7b98a0c57949f79e2bc1b04624c59c953
                • Instruction Fuzzy Hash: 921106B59002488FCB20DF9AC4447DEBBF4EB48324F10845AD569B7700D774A948CFA5
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • SendMessageW.USER32(?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 05BF842D
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: MessageSend
                • String ID:
                • API String ID: 3850602802-0
                • Opcode ID: 6caa7d9f249bd89e48a7bc71454364694207536ed417543dbb44112588975d07
                • Instruction ID: 59a3e594f42ed585763ade114ac030fe36b6b85604b27ce2438be0a3ad8c935f
                • Opcode Fuzzy Hash: 6caa7d9f249bd89e48a7bc71454364694207536ed417543dbb44112588975d07
                • Instruction Fuzzy Hash: 0711D0B68002499FDB10DF9AD584BDEBBF8EB48320F14845AE559B7700D378A584CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • OleInitialize.OLE32(00000000), ref: 05BFA1B5
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: 85f9383409c641ccc6e32e0294d575b961e34722396b3882913c7a925d45ac10
                • Instruction ID: 8ce278b5d0f634ba9a8faec5cec5a9c88cee5c600536641ef7f474c334d92ca5
                • Opcode Fuzzy Hash: 85f9383409c641ccc6e32e0294d575b961e34722396b3882913c7a925d45ac10
                • Instruction Fuzzy Hash: EF11F3B5D00248CFCB10DF9AD584BDEBBF4AB48324F24845AD519B7710D378A548CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,05BF4530), ref: 05BF9EBF
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: CallbackDispatcherUser
                • String ID:
                • API String ID: 2492992576-0
                • Opcode ID: 2f359a1d7623d0d986f400febf2e74731fbc4ed722235578f23162689f968a8d
                • Instruction ID: fb8c7d69aa153e0772da9d6cafecd802cf0dfdfbf96acd328172750fa275f839
                • Opcode Fuzzy Hash: 2f359a1d7623d0d986f400febf2e74731fbc4ed722235578f23162689f968a8d
                • Instruction Fuzzy Hash: 831100B58002088FCB10CF9AC5847DEBBF4AB48320F20885AD569B3700C378A548CFA0
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • OleInitialize.OLE32(00000000), ref: 05BFA1B5
                Memory Dump Source
                • Source File: 00000013.00000002.744785514.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_5bf0000_svchost.jbxd
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: 24bb57b05b5e1c64c72cdfbd0d7d5a9082d273f7754c4cf1701f3af4a3b83774
                • Instruction ID: 8dc8f011b3e082d6fc4aa3a04282ff5ad9ec59ef005656ba5bfb14be91001385
                • Opcode Fuzzy Hash: 24bb57b05b5e1c64c72cdfbd0d7d5a9082d273f7754c4cf1701f3af4a3b83774
                • Instruction Fuzzy Hash: 8DF02B7290C2808FCB2187AED8443D9BFF0EF55354F6544CAC18DE7661D278A24DC750
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000013.00000002.743227910.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_1a9d000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be6cec666cdafefcf73793df3ca9a66684582f2d619689402f894f6615db07b1
                • Instruction ID: c7b32293e9470082ce583ae5bd3411b8405420de2c4843e9a1d1763a00938351
                • Opcode Fuzzy Hash: be6cec666cdafefcf73793df3ca9a66684582f2d619689402f894f6615db07b1
                • Instruction Fuzzy Hash: 4421C172504240DFDF16DF68D9C0B26BFA5FB88328F248569E8051B246C336D8D6CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000013.00000002.743227910.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_1a9d000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1e1659640becc28bb2d44df454aaab270bd631880006459d11e9ce857cf1b9a1
                • Instruction ID: 47fa73efa6466d781abb84e16f79c4e55c74d50acd0429c8eb8f40a2fbe9dc13
                • Opcode Fuzzy Hash: 1e1659640becc28bb2d44df454aaab270bd631880006459d11e9ce857cf1b9a1
                • Instruction Fuzzy Hash: A721E271504240DFDF05DF58D9C0B66BBA5FBC8324F24C569E9091B247C33AE4C6C6A1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000013.00000002.743289701.0000000001AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 01AAD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_1aad000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4cb72bb2f0996ef70403f012cd17675efa4e8c30ef7b755a32937b1ba387a97c
                • Instruction ID: f46a9c91d3ba9c2da1f1158981d0b6ed2cf7633bf3c1acb1254736a1269ed735
                • Opcode Fuzzy Hash: 4cb72bb2f0996ef70403f012cd17675efa4e8c30ef7b755a32937b1ba387a97c
                • Instruction Fuzzy Hash: 18213471684240DFDB15CF68D8C0B26BF65FB88364F64C569E88A4B746C33AD807CB61
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000013.00000002.743227910.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_1a9d000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction ID: d4cac473bac2fdeb622d4be6655c8c06cf9b0e80475f8c6d500a77666755e601
                • Opcode Fuzzy Hash: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction Fuzzy Hash: CC11D376904280CFDF12CF54D5C4B16BFB2FB84324F24C6A9D8454B616C33AD496CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000013.00000002.743227910.0000000001A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A9D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_1a9d000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction ID: 074d9e9a1b93299cc8c2f08e7610347d6e890e20b400e39629b074fb08068f02
                • Opcode Fuzzy Hash: fb067d5dad88413f3e34b132bb63acaa0c988591488faadeeb326543b5c515d9
                • Instruction Fuzzy Hash: CF119D76504280DFDF12CF54D5C4B56BFB2FB84224F24C6A9D8490B617C33AE496CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000013.00000002.743289701.0000000001AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 01AAD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_19_2_1aad000_svchost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21427ca23a48a55dcad0e3d484f99097b9453c19b67056f3b82d25d18eec669f
                • Instruction ID: 58959969f4ef0d52cc20bee05ea5febfefa0760aff0385505c066ab17e842a3f
                • Opcode Fuzzy Hash: 21427ca23a48a55dcad0e3d484f99097b9453c19b67056f3b82d25d18eec669f
                • Instruction Fuzzy Hash: 7C11D075544280CFDB12CF14D5C4B15FF72FB84324F24C6AAD88A4BA56C33AD44ACB61
                Uniqueness

                Uniqueness Score: -1.00%