Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
02.dll.dll

Overview

General Information

Sample name:02.dll.dll
(renamed file extension from exe to dll)
Original sample name:02.dll.exe
Analysis ID:1427741
MD5:4b7b85d70329e085ab06dcdf9557b0a0
SHA1:3a277203cb4916eb1f55f867f0bd368476c613fb
SHA256:49220571574da61781de37f35c66e8f0dadb18fdedb6d3a1be67485069cfd4b0
Tags:exeQakbottchk08
Infos:

Detection

Bazar Loader, Qbot
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Check for Windows Defender sandbox
Multi AV Scanner detection for submitted file
Yara detected Bazar Loader
Yara detected Qbot
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 5484 cmdline: loaddll64.exe "C:\Users\user\Desktop\02.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 1708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3720 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 3440 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 3056 cmdline: C:\Windows\system32\WerFault.exe -u -p 3440 -s 424 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 1900 cmdline: rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 3380 cmdline: C:\Windows\system32\WerFault.exe -u -p 1900 -s 416 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 4124 cmdline: rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_async MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 4448 cmdline: C:\Windows\system32\WerFault.exe -u -p 4124 -s 420 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 1408 cmdline: rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_bin MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 6620 cmdline: C:\Windows\system32\WerFault.exe -u -p 1408 -s 416 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 5612 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5012 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_async MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3092 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_bin MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6540 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",checkit MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6204 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_uninit MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1216 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_text MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1360 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_optionv MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2796 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_option MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3200 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_json MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1272 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_info MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1488 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_bin MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3116 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload_async MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3652 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3924 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_type_of MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5952 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_string MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7180 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_real MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7200 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_path MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7212 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_object MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7232 cmdline: rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_long MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
QakBot, qbotQbotQBot is a modular information stealer also known as Qakbot or Pinkslipbot. It has been active for years since 2007. It has historically been known as a banking Trojan, meaning that it steals financial data from infected systems, and a loader using C2 servers for payload targeting and download.
  • GOLD CABIN
https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
No configs have been found
SourceRuleDescriptionAuthorStrings
00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_2Yara detected QbotJoe Security
    00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
      00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
        00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_2Yara detected QbotJoe Security
          00000016.00000002.2180749909.000001A41A104000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_2Yara detected QbotJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            22.2.rundll32.exe.1a41a104000.3.raw.unpackJoeSecurity_Qbot_2Yara detected QbotJoe Security
              22.2.rundll32.exe.1a41a0d280d.2.raw.unpackJoeSecurity_Qbot_2Yara detected QbotJoe Security
                22.2.rundll32.exe.1a41a0d060d.1.raw.unpackJoeSecurity_Qbot_2Yara detected QbotJoe Security
                  22.2.rundll32.exe.1a41a0d060d.1.raw.unpackJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
                    22.2.rundll32.exe.1a41a0d280d.2.unpackJoeSecurity_Qbot_2Yara detected QbotJoe Security
                      Click to see the 2 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 02.dll.dllVirustotal: Detection: 19%Perma Link
                      Source: 02.dll.dllReversingLabs: Detection: 13%
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800750F0 CryptAcquireContextA,GetLastError,CryptGenRandom,3_2_00000001800750F0
                      Source: Binary string: C:\testing3\data\bdnc\BDNIMBUS-3071711\BDNIMBUS\bin\release\bdnc.pdb source: rundll32.exe, 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2139051997.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2145893367.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2168111693.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2123138544.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2113846587.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2115651942.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2168006557.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2115667100.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2118582232.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2120004903.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2122221736.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.2119209789.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2120409335.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2120576111.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2122212594.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000028.00000002.2122216421.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.2122426344.0000000180252000.00000002.00000001.01000000.00000003.sdmp, 02.dll.dll
                      Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B90ECD0 NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,22_2_000001A41B90ECD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B911BB8 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,22_2_000001A41B911BB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B90E6E8 NtAllocateVirtualMemory,NtWriteVirtualMemory,22_2_000001A41B90E6E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B90EE48 NtResumeThread,22_2_000001A41B90EE48
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B91B1C4 NtProtectVirtualMemory,char_traits,NtProtectVirtualMemory,22_2_000001A41B91B1C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E0A03_2_000000018001E0A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004D0203_2_000000018004D020
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800040B03_2_00000001800040B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002F0C03_2_000000018002F0C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800301903_2_0000000180030190
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800D61A03_2_00000001800D61A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800201B03_2_00000001800201B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800092003_2_0000000180009200
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800832203_2_0000000180083220
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800164D03_2_00000001800164D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800045303_2_0000000180004530
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001802505583_2_0000000180250558
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001802445243_2_0000000180244524
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800325503_2_0000000180032550
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001802365403_2_0000000180236540
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018022D5883_2_000000018022D588
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800315703_2_0000000180031570
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800475D03_2_00000001800475D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800195D03_2_00000001800195D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018023065C3_2_000000018023065C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002F6403_2_000000018002F640
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800576A03_2_00000001800576A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800367103_2_0000000180036710
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018024C7003_2_000000018024C700
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800067603_2_0000000180006760
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800507703_2_0000000180050770
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800307D03_2_00000001800307D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002F8003_2_000000018002F800
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C8403_2_000000018000C840
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002E9203_2_000000018002E920
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018022D95C3_2_000000018022D95C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800319503_2_0000000180031950
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800329703_2_0000000180032970
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018022E9683_2_000000018022E968
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001802439F43_2_00000001802439F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180032B403_2_0000000180032B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180020B503_2_0000000180020B50
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180031BB03_2_0000000180031BB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002FBB03_2_000000018002FBB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180048C203_2_0000000180048C20
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001CC703_2_000000018001CC70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180031CB03_2_0000000180031CB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002FD103_2_000000018002FD10
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018022DD303_2_000000018022DD30
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180046DA03_2_0000000180046DA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DDC03_2_000000018001DDC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004FDE03_2_000000018004FDE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180030E403_2_0000000180030E40
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002FE503_2_000000018002FE50
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180243EA43_2_0000000180243EA4
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0D004022_2_000001A41A0D0040
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0E6B4922_2_000001A41A0E6B49
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0E2BA522_2_000001A41A0E2BA5
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0EE81D22_2_000001A41A0EE81D
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0ED86122_2_000001A41A0ED861
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0F208D22_2_000001A41A0F208D
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0E48CD22_2_000001A41A0E48CD
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0E8D4122_2_000001A41A0E8D41
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0F055D22_2_000001A41A0F055D
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0EB5CD22_2_000001A41A0EB5CD
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0DB60D22_2_000001A41A0DB60D
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0D470122_2_000001A41A0D4701
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B910F9822_2_000001A41B910F98
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B912CC022_2_000001A41B912CC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B91BC5422_2_000001A41B91BC54
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B92048022_2_000001A41B920480
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B91CC1022_2_000001A41B91CC10
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B914F3C22_2_000001A41B914F3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B902AF422_2_000001A41B902AF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B9199C022_2_000001A41B9199C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B909A0022_2_000001A41B909A00
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B91713422_2_000001A41B917134
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B91E95022_2_000001A41B91E950
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180026F00 appears 52 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00000001800D7120 appears 105 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018002B690 appears 297 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180043930 appears 40 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180227E80 appears 162 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00000001800C6790 appears 133 times
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3440 -s 424
                      Source: 02.dll.dllBinary or memory string: OriginalFilenamebdnc.dllT vs 02.dll.dll
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@72/17@0/0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001CC70 CertOpenSystemStoreA,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCRLsInStore,CertEnumCRLsInStore,CertCloseStore,3_2_000000018001CC70
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B9117AC CreateToolhelp32Snapshot,Process32First,Process32Next,FindCloseChangeNotification,22_2_000001A41B9117AC
                      Source: C:\Windows\System32\rundll32.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1708:120:WilError_03
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1900
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1408
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3440
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4124
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e0b944d2-36ac-4e22-bd7b-34a71db2a648Jump to behavior
                      Source: 02.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask
                      Source: 02.dll.dllVirustotal: Detection: 19%
                      Source: 02.dll.dllReversingLabs: Detection: 13%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\02.dll.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3440 -s 424
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1900 -s 416
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_async
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4124 -s 420
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_bin
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1408 -s 416
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_async
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_bin
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",checkit
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_uninit
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_text
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_optionv
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_option
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_json
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_info
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_bin
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload_async
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_type_of
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_string
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_real
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_path
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_object
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_long
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_askJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_asyncJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_binJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_askJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_asyncJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_binJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",checkitJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_uninitJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_textJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_optionvJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_optionJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_jsonJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_infoJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_binJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload_asyncJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_uploadJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_type_ofJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_stringJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_realJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_pathJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_objectJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_longJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: 02.dll.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: 02.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: 02.dll.dllStatic file information: File size 3691008 > 1048576
                      Source: 02.dll.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x250400
                      Source: 02.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 02.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 02.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 02.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 02.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 02.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 02.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\testing3\data\bdnc\BDNIMBUS-3071711\BDNIMBUS\bin\release\bdnc.pdb source: rundll32.exe, 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2139051997.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2145893367.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2168111693.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2123138544.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2113846587.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2115651942.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2168006557.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2115667100.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2118582232.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2120004903.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2122221736.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.2119209789.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2120409335.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2120576111.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2122212594.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000028.00000002.2122216421.0000000180252000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.2122426344.0000000180252000.00000002.00000001.01000000.00000003.sdmp, 02.dll.dll
                      Source: 02.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 02.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 02.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 02.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 02.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004FBF0 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,3_2_000000018004FBF0
                      Source: 02.dll.dllStatic PE information: real checksum: 0x37113d should be: 0x3893d8
                      Source: 02.dll.dllStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0F634A push cs; retn 0000h22_2_000001A41A0F6386
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0F4458 push ebx; iretd 22_2_000001A41A0F44DD
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0F44D4 push ebx; iretd 22_2_000001A41A0F44DD
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41A0F39DD push ds; ret 22_2_000001A41A0F39E5
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B922CC7 push ebx; iretd 22_2_000001A41B922CD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B92A101 push esp; ret 22_2_000001A41B92A10B
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B922C4B push ebx; iretd 22_2_000001A41B922CD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B9287C5 push esp; ret 22_2_000001A41B9287C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B92873C push esp; ret 22_2_000001A41B9287C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B924B3D push cs; retn 0000h22_2_000001A41B924B79
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B9221D0 push ds; ret 22_2_000001A41B9221D8
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\System32\rundll32.exeFile Queried: C:\INTERNAL\__emptyJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 2.1 %
                      Source: C:\Windows\System32\loaddll64.exe TID: 5424Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 6488Thread sleep count: 237 > 30Jump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\rundll32.exeCode function: 22_2_000001A41B910450 LookupAccountSidW,GetSystemInfo,22_2_000001A41B910450
                      Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
                      Source: Amcache.hve.9.drBinary or memory string: VMware
                      Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.9.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.9.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001802432BC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00000001802432BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004FBF0 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,3_2_000000018004FBF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001802432BC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00000001802432BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180227ED0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0000000180227ED0

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 26204A90000 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 26204AC0000 protect: page read and writeJump to behavior
                      Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 26204A90000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 26204AC0000Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 26204A90000Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 7FF6070E6590Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800744F0 GetProcAddress,GetSystemTimeAsFileTime,3_2_00000001800744F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180061840 GetVersion,RegOpenKeyExA,GetLastError,RegOpenKeyExA,GetLastError,RegCloseKey,RegCloseKey,RegOpenKeyExA,GetLastError,RegCloseKey,3_2_0000000180061840
                      Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d060d.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a104000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d280d.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d060d.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d280d.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d060d.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a104000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2180749909.000001A41A104000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2181091820.000001A41BB06000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d060d.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a104000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d280d.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d060d.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d280d.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a0d060d.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.1a41a104000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2180749909.000001A41A104000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.2181091820.000001A41BB06000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018007BAC0 bind,WSAGetLastError,WSAGetLastError,3_2_000000018007BAC0
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      311
                      Process Injection
                      21
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      2
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      311
                      Process Injection
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager21
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                      Obfuscated Files or Information
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Install Root Certificate
                      LSA Secrets15
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Rundll32
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1427741 Sample: 02.dll.exe Startdate: 18/04/2024 Architecture: WINDOWS Score: 84 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected Qbot 2->31 33 Yara detected Bazar Loader 2->33 8 loaddll64.exe 1 2->8         started        process3 process4 10 rundll32.exe 8->10         started        13 cmd.exe 1 8->13         started        15 rundll32.exe 8->15         started        17 21 other processes 8->17 signatures5 35 Check for Windows Defender sandbox 10->35 37 Writes to foreign memory regions 10->37 39 Allocates memory in foreign processes 10->39 41 Injects a PE file into a foreign processes 10->41 19 rundll32.exe 13->19         started        21 WerFault.exe 16 15->21         started        23 WerFault.exe 19 17->23         started        25 WerFault.exe 16 17->25         started        process6 process7 27 WerFault.exe 20 16 19->27         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      02.dll.dll20%VirustotalBrowse
                      02.dll.dll13%ReversingLabsWin64.Trojan.Nekark
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.9.drfalse
                        high
                        No contacted IP infos
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1427741
                        Start date and time:2024-04-18 03:19:09 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 2s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:42
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:02.dll.dll
                        (renamed file extension from exe to dll)
                        Original Sample Name:02.dll.exe
                        Detection:MAL
                        Classification:mal84.troj.evad.winDLL@72/17@0/0
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 87%
                        • Number of executed functions: 34
                        • Number of non-executed functions: 225
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 13.89.179.12
                        • Excluded domains from analysis (whitelisted): www.oracle.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, oracle.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        TimeTypeDescription
                        03:20:10API Interceptor1x Sleep call for process: loaddll64.exe modified
                        03:20:12API Interceptor4x Sleep call for process: WerFault.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.8082924720265338
                        Encrypted:false
                        SSDEEP:96:ql4p3FBRiGyKyssjA4RvT1If7QXIDcQvc6LcEtUcw3tsXaXz+HbHgSQgJjLh88W5:oc1iGysc0hP8QjtAzuiFYZ24lO8Y
                        MD5:8BC8038677D312A01AB6770E00A57E21
                        SHA1:D395D2560E8754E1F8F7F393F003B3181FAF5A2D
                        SHA-256:A5D5799ED9BDBCAAA43590F5D055E4E5318D22AB9C46591F4EC79C01521EFA06
                        SHA-512:CD37ECD4C2379B6179B69044D553B5BB893E24AAF4CB9D62141E578941C76D23BF3BF113659F0928FEE0839D1562335745E78970C0AE0C5066E972A850F9C644
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.3.5.5.6.0.6.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.3.8.0.6.0.6.8.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.d.f.1.0.7.9.4.-.1.2.d.3.-.4.a.e.b.-.8.e.1.2.-.1.8.0.7.7.b.7.7.d.8.b.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.c.f.5.b.d.f.0.-.a.3.5.9.-.4.a.4.b.-.a.9.d.1.-.2.d.5.7.2.4.a.6.a.b.e.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.0.2...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.1.c.-.0.0.0.1.-.0.0.1.4.-.5.c.6.3.-.2.e.8.a.2.e.9.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.8115214235177357
                        Encrypted:false
                        SSDEEP:192:J8QIi0y6c0hPoX2aj1AzuiFYZ24lO8YC:JjIi56XhPodjyzuiFYY4lO8Y
                        MD5:6EFB7DFB40031E1116F12D173F6139C4
                        SHA1:993B47048ECE85AD7E7108F7474E89D2083AB579
                        SHA-256:91375811CA61F07D3414EDEDA711EA214B3E13B60ED2CDEA2819C9B6FC116ECC
                        SHA-512:0CC42587B12320CCEE9BC6A3027274043400EFEC7DC01B062EED7D260C2281C35FAA48C37AF9F2D1B5AB8DBA13C63B3C9DE3A375B53B35DF3F001037C617B261
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.0.7.2.5.0.9.9.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.1.1.9.3.8.4.9.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.c.7.6.4.2.f.a.-.6.a.a.c.-.4.5.6.6.-.a.b.6.f.-.4.7.7.e.a.e.e.5.7.c.2.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.4.4.7.0.e.1.-.e.e.b.7.-.4.7.5.0.-.9.3.a.7.-.d.1.7.6.0.1.9.9.a.5.6.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.0.2...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.7.0.-.0.0.0.1.-.0.0.1.4.-.f.d.6.9.-.6.4.8.8.2.e.9.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.8089879568754943
                        Encrypted:false
                        SSDEEP:96:qgp/FdhRiOyKynsjA4RvT1If7QXIDcQvc6LcEicw3j2EXaXz+HbHgSQgJjLh88WJ:LXXiOync0hPoX2aj9AzuiFYZ24lO8Y
                        MD5:A3CB9E5CD69F38F677D78EC6959D4784
                        SHA1:2C37BB455EE7B07FDAB72E7A7E0BA69742F8AD1C
                        SHA-256:EF0968435DE28197566E7337146A5FC73EBA15AA8DB5CB0A2644C107996A401B
                        SHA-512:27B634FF122E1E70E6EC276591F38E30B254627F20C3EE56420CE774DCCA2C2263F3A28565AB01817E71791473E3BDA87D6320C61022108749BFA326124E9EC5
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.6.5.7.2.5.7.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.6.8.2.2.5.7.2.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.8.c.6.e.7.0.b.-.b.3.4.9.-.4.c.f.0.-.8.a.4.1.-.4.c.9.0.6.4.9.f.f.4.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.2.7.2.2.5.0.6.-.8.4.0.1.-.4.b.3.0.-.9.7.a.a.-.0.b.d.5.7.b.0.b.0.8.d.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.0.2...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.8.0.-.0.0.0.1.-.0.0.1.4.-.8.7.8.a.-.f.a.8.b.2.e.9.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.811597969659895
                        Encrypted:false
                        SSDEEP:96:qWprrFrRizyKyzsjA4RvT1If7QXIDcQvc6LcEicw3j2EXaXz+HbHgSQgJjLh88WR:t/izyzc0hPoX2aj1AzuiFYZ24lO8Y
                        MD5:1294F3C3A5768E99BD3F533DBB43B19C
                        SHA1:716BDC40183E5F1BBC67FAA7C6F1E12E83047C10
                        SHA-256:E55A113253EE2B686EE2C36667BAED157E10E16220E854DF3CBC8F334B4C254B
                        SHA-512:397812AC79601347FB79D74DC3E2E2231A2735F847AD13E672CC92AC43D4863EF33275DA59B7B3A5436C8C17030A4E3135F5802D862000AA608857582AC26A8C
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.0.7.1.0.6.8.0.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.7.8.7.6.8.0.1.3.6.6.9.3.5.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.6.b.0.6.d.3.0.-.c.9.6.0.-.4.7.a.9.-.9.1.7.0.-.1.1.a.b.0.5.6.1.e.4.e.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.6.6.a.7.a.b.c.-.6.5.2.b.-.4.3.7.4.-.a.4.6.4.-.2.5.3.e.c.a.9.9.0.6.c.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.0.2...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.6.c.-.0.0.0.1.-.0.0.1.4.-.8.0.e.0.-.6.2.8.8.2.e.9.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:00 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):58282
                        Entropy (8bit):1.7193917176200701
                        Encrypted:false
                        SSDEEP:192:bs2I0D1DOMHorXMFK781rYu0EH240+MyjN39NRTji/iBuRd:I2N16qormM8dYM24HN3hi/p
                        MD5:644772762B089464607684A5603C5A03
                        SHA1:6FF3ABDF005AD41D7772FAC54BADE65EEB44B2F9
                        SHA-256:C3DB242CB77E5B24D6A95EA12110C14F4216CB86D10B62225E58E7446962191A
                        SHA-512:755BC48F73935D65D96DC239976C48962461A887DEB961ABBAC2C210F5431810DE37EE5572F3C1E9A1F15F680386DE360A5B517321D79B4D63E34EC237695FD7
                        Malicious:false
                        Preview:MDMP..a..... .......@u f........................@................,..........T.......8...........T.......................................................................................................................eJ......`.......Lw......................T.......l...@u f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:00 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):58870
                        Entropy (8bit):1.708872808113408
                        Encrypted:false
                        SSDEEP:192:bpI0u1POMHKllpHiKi4xQEdKr+CapD11Aaci:dc1Gq0lxi4xQEdKr+CapDjYi
                        MD5:EAB344A5A9C8BE8D204D6AE40800359B
                        SHA1:7171B4C0F5446AAC9868D002C02CB58728EC6F8C
                        SHA-256:02222046B401ACD38D90CA70677DA64DDE7290750961B8EFBC80E0EACFB02935
                        SHA-512:F921B79BD193E80E1C8799A4991DDA21DE1DEEDB2557B81966ADBD06C007D338479370E64468EBDD2D7119EA470CEA701C9E0D401DA43B7202214D20B8A0A9AF
                        Malicious:false
                        Preview:MDMP..a..... .......@u f........................@................,..........T.......8...........T.......................................................................................................................eJ......`.......Lw......................T.......p...@u f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8766
                        Entropy (8bit):3.6984219958289297
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJ+qVi6YlvA0gmfk372tvDpr+89bhsSfxLm:R6lXJDw6Ytbgmfk3ehJfg
                        MD5:16FF884239786523B25BDD79161F60D0
                        SHA1:BC6D0BED4D9D590149CE33E8B048010662967C5E
                        SHA-256:8BFB47D40CAF933C40C7BB5093BE952E08378E95EFE4516AFEC4F3AD91707F97
                        SHA-512:1A04D2A79BB20E5558981269D46C0FA6F47AE1600320470040D62C0D7CB0A1B43D0AF192E0543BBA4E0994F36BD63535362DA1867D99467FA00341A88C5D4465
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.4.0.<./.P.i.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8758
                        Entropy (8bit):3.697672319700179
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJd1VUPX6Y0AcszOLgmfk372tvDprB89bh+Sf4Lm:R6lXJ/+6YzOgmfk3Xh7fZ
                        MD5:6BDC52AB39792FBBDDD1A25FBDC1D53A
                        SHA1:EBF5A54095B46D817986E62B025B1568CC4755EE
                        SHA-256:D43D1A92E47F1B9A22E67B53B7284B43E0ACDD9FF9B72BA31D7121AA0B51410C
                        SHA-512:8F9AD5DBB4E39ED37B568B06B8FA90F9386166090BBC06EF878E4F389AB12ABA359A75619A65FF9D2639F2786A329E3394A7656EB11F149CA648DDA99F7530B1
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.9.0.0.<./.P.i.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4744
                        Entropy (8bit):4.468276674950434
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zs3uJg771I90XWpW8VYeYm8M4JCfCXJFkRyq85mA7ptSTSld:uIjfUI7Dm7VGJyR0poOld
                        MD5:E1A6C84DC4832C858D88925426277DA1
                        SHA1:2BE3C580511F3CF1B4DDE1DEA953225D9527C50A
                        SHA-256:FFCFC3ABC6ABEE78AD8CC5734282356660CF517DF4EDCBA48B6F3464A326CF06
                        SHA-512:7A8B19F482AF3D5E94AD3DE11A20E68527C3C91949A2D579896EF2B46E56EFCCA94234C9B62003026767B152E3B08F8AE2439F2325131F25C73BD572891E6573
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="284662" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4744
                        Entropy (8bit):4.467290990541675
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zs3uJg771I90XWpW8VYXYm8M4JCfCXJFPKDmyq85mAeptSTSyDd:uIjfUI7Dm7VbJZKiNpoOyDd
                        MD5:8B9A4B8E23816886E17C0C64DC19BCC6
                        SHA1:472CE55121372B094300D79E97888176DC6DC6D1
                        SHA-256:AEFB12FFA21CC253D465EB6E4EF5FC260945F3637C63B45DE87A44FBD6C7E13E
                        SHA-512:11E9BABD14266320D9C30FEBE30182A8360A85C0BCF08E6AE4B408C3408657E71998779C2842D84390D86D2848E7C08E633F9430866B9F8920F823E14A667E1F
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="284662" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:03 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):59694
                        Entropy (8bit):1.6743203613055226
                        Encrypted:false
                        SSDEEP:96:5t85E3eABknlv1fvmBR25U2UUwgooi7MHBjLWOUMq9RXT6EfEODXexJqekRAOacw:06TkvVOMH5iO89Rm2XexgyOsrE2vW54
                        MD5:2FD98A46EB3005DE47ECAE8A1CDF121E
                        SHA1:39CD14F89AA2278C967ED928C5DF5AB4A979BB1B
                        SHA-256:272C7390F5C035323AC74686547B0C981891DBC4932D92EEF4917304F6EFC361
                        SHA-512:DD94F8F112C083AB9B47A67A5E1B2A2E45393ABD3F221811D34C925E649C65A235BF1D4B4453A73A5C6F99FD1B4F5CFF33CF42F9F1C5F205A7A9D7BAABE5A531
                        Malicious:false
                        Preview:MDMP..a..... .......Cu f........................@................,..........T.......8...........T.......................................................................................................................eJ......`.......Lw......................T...........Cu f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8506
                        Entropy (8bit):3.694288426386566
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJ2qVp6Y0dcszOLgmfk37vDpr089bT1yfKxm:R6lXJr76YGOgmfk3DTwf1
                        MD5:99DF30C977564A5ABFC5A2FF693BAEC1
                        SHA1:91BBF7A741C677700F149355EBD4629D1EBF3D3A
                        SHA-256:4D98E460794FA518733218173635FBC616FDB3FB02D225D690B24D177793EA58
                        SHA-512:BBF1FEAA4E0021CFBF2C035292E0ABEF0D4E8A8F014F6D2423C24181FFB87CEFC70945E6333E5C7985A31F69F4D397D56E0CDE9B964F0A4DDED55A3622C32113
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.1.2.4.<./.P.i.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4743
                        Entropy (8bit):4.467080925548001
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zs3uJg771I90XWpW8VYiYm8M4JCfCXJFG0yq85mA1CYptSTSpd:uIjfUI7Dm7VmJ1mpoOpd
                        MD5:F5B41DD9878713AA8BE3228D8D363B40
                        SHA1:A4B0695FEE3C66DCDCCFE8C2D7B0FB5D0035DA73
                        SHA-256:59F453826B1B108AD0C75FF04D982D93F24EFC9EC00B56954086E783694E6C0A
                        SHA-512:BBAE7E7D2FD210B4F5212CB99E4AE10C073D6F1284794130081CEA04FC1A94947CC601331C5300C1BFA628ED4775F6D8CD5C560311EF2F8DC8741102B0735ECB
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="284662" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Thu Apr 18 01:20:06 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):58826
                        Entropy (8bit):1.7090980002259442
                        Encrypted:false
                        SSDEEP:192:tlRNIQoOMfUYqoQwo+OznLQJJ+yXHy2mT0x27:LrIQvyUYqoQkOznLXeHy2ez7
                        MD5:0FA0AF43A912BE7E4311CAD17E122C59
                        SHA1:F0EB182403CE5DF6FF74CF80D1EAA6ACF4A03F47
                        SHA-256:F1C9B48FF71D358FF1E8EDC95E6294B9F3197040A30B2EDC2B7D4EF0437718E2
                        SHA-512:60CD943FF9A0BD044D6647C0E6627AC4382CB771A122D6B1DFA311D37F900FD387346001F08AFA8F1D91F30A2EFC2DCF0A99F18C4EA1B8EC476DC36791B1B2D7
                        Malicious:false
                        Preview:MDMP..a..... .......Fu f........................@................,..........T.......8...........T.......................................................................................................................eJ......`.......Lw......................T...........Fu f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8506
                        Entropy (8bit):3.6949204379085394
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJQ+VS6Y0jcszOLgmfk372tvDpra89bugyf46m:R6lXJJA6YYOgmfk3quNfk
                        MD5:BDCAAE2179159C3E6656229A9D81DFFE
                        SHA1:C6E33EFB6EE7DC6A974DC9B437FD45DE1A0F97BC
                        SHA-256:A086BECFC90AB057B3AD16BE85104F8A8D29BE5903144119FA7EA099F8FC186A
                        SHA-512:449E7793F96AF160DD7E50A332407AF4B089F97C7F88B70538D577529F30291DEDF6475E31C79A124C2B8F528B200FAAA2F7C5B17BD4CC639F1DCB64B74E5F8B
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.0.8.<./.P.i.
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4743
                        Entropy (8bit):4.467824020362348
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zs3uJg771I90XWpW8VYrYm8M4JCfCXJFtyq85mAmaptSTSgd:uIjfUI7Dm7VXJv3apoOgd
                        MD5:95985D277F5FE849CF463978C0038729
                        SHA1:F7528A828A0DF4083FC091331ED67B60810988EE
                        SHA-256:C14252C543D522A19E16DB35D274F0B2182B84D4D8BD00B512B30EB86D1A5E56
                        SHA-512:93F2B67CFE50D030B1EE41DEDB4245FFB240495455F76438CE6AF4321B668981CA68C085D804DF717E680AAD75A8CE859615B5E6FE0D917B296F7F0503DFBAF7
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="284662" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\System32\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.4224041272369385
                        Encrypted:false
                        SSDEEP:6144:gSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNa0uhiTw:LvloTMW+EZMM6DFy003w
                        MD5:019AEAB32F0DF52C5BDA99EF3F0BFB80
                        SHA1:1BE92D2D7D82C98D80A6808586582CF45F5113B2
                        SHA-256:DCFF30054B1FF720115E6ACE21B8A2C6E992FD5B543D6DF5C7F0E9BB67EC04A3
                        SHA-512:D637E44EA0A218E6904348EF86F70722446B9EE21FC2BC566B79791A8EDB91449D700397BA880FE7583848681A5FEC407ACE66DED8B5560EB400E9879662211B
                        Malicious:false
                        Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...................................................................................................................................................................................................................................................................................................................................................*...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                        Entropy (8bit):6.537318244324088
                        TrID:
                        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                        • Win64 Executable (generic) (12005/4) 10.17%
                        • Generic Win/DOS Executable (2004/3) 1.70%
                        • DOS Executable Generic (2002/1) 1.70%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                        File name:02.dll.dll
                        File size:3'691'008 bytes
                        MD5:4b7b85d70329e085ab06dcdf9557b0a0
                        SHA1:3a277203cb4916eb1f55f867f0bd368476c613fb
                        SHA256:49220571574da61781de37f35c66e8f0dadb18fdedb6d3a1be67485069cfd4b0
                        SHA512:50087b509b58a50db0a67f2aea2838c2783fb2d1d6f5a22d3a68b31e0cdfa7b3b5d469df16af437a6396d3f8dc75fafd689f9af9ce72bfb0c541a3f37ef77f03
                        SSDEEP:49152:Js0ewfW1oFguIXFkCEDeQi5LpAO85kDe8MS6pBAuowCSHeuOz8eoY3qtI:vfWzuEKCh91Bw8HFwCS+uXevq
                        TLSH:63068E9AB7A80198D876D23CC6575217D7F2F8111370A7CF1AA85ABA1F33BD6123E740
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................W.......W.........Y.............................W.......W...........T...A.......A...L...A.......A.[.....A......
                        Icon Hash:7ae282899bbab082
                        Entrypoint:0x18022848c
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x180000000
                        Subsystem:windows cui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                        DLL Characteristics:HIGH_ENTROPY_VA
                        Time Stamp:0x654A6229 [Tue Nov 7 16:13:29 2023 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:13904d1cc18631217d0dcb5bf82fbc09
                        Signature Valid:
                        Signature Issuer:
                        Signature Validation Error:
                        Error Number:
                        Not Before, Not After
                          Subject Chain
                            Version:
                            Thumbprint MD5:
                            Thumbprint SHA-1:
                            Thumbprint SHA-256:
                            Serial:
                            Instruction
                            dec eax
                            mov dword ptr [esp+08h], ebx
                            dec eax
                            mov dword ptr [esp+10h], esi
                            push edi
                            dec eax
                            sub esp, 20h
                            dec ecx
                            mov edi, eax
                            mov ebx, edx
                            dec eax
                            mov esi, ecx
                            cmp edx, 01h
                            jne 00007FB1F4806FF7h
                            call 00007FB1F4807520h
                            dec esp
                            mov eax, edi
                            mov edx, ebx
                            dec eax
                            mov ecx, esi
                            dec eax
                            mov ebx, dword ptr [esp+30h]
                            dec eax
                            mov esi, dword ptr [esp+38h]
                            dec eax
                            add esp, 20h
                            pop edi
                            jmp 00007FB1F4806E84h
                            int3
                            int3
                            int3
                            dec eax
                            mov dword ptr [esp+10h], ebx
                            dec eax
                            mov dword ptr [esp+18h], esi
                            push edi
                            dec eax
                            sub esp, 10h
                            xor eax, eax
                            xor ecx, ecx
                            cpuid
                            inc esp
                            mov eax, ecx
                            inc ebp
                            xor ebx, ebx
                            inc esp
                            mov edx, edx
                            inc ecx
                            xor eax, 6C65746Eh
                            inc ecx
                            xor edx, 49656E69h
                            inc esp
                            mov ecx, ebx
                            mov esi, eax
                            xor ecx, ecx
                            inc ecx
                            lea eax, dword ptr [ebx+01h]
                            inc ebp
                            or edx, eax
                            cpuid
                            inc ecx
                            xor ecx, 756E6547h
                            mov dword ptr [esp], eax
                            inc ebp
                            or edx, ecx
                            mov dword ptr [esp+04h], ebx
                            mov edi, ecx
                            mov dword ptr [esp+08h], ecx
                            mov dword ptr [esp+0Ch], edx
                            jne 00007FB1F4807042h
                            dec eax
                            or dword ptr [0010534Bh], FFFFFFFFh
                            and eax, 0FFF3FF0h
                            cmp eax, 000106C0h
                            je 00007FB1F480701Ah
                            cmp eax, 00020660h
                            je 00007FB1F4807013h
                            cmp eax, 00020670h
                            je 00007FB1F480700Ch
                            add eax, FFFCF9B0h
                            cmp eax, 20h
                            jnbe 00007FB1F4807016h
                            dec eax
                            mov ecx, 00000001h
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x3238200x470.rdata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x323c900xc8.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x35a0000x2ce24.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3350000x23370.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x3586000x99a8
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x3870000x88e8.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x2ff7b00x70.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2ff8200x138.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x2520000x720.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x2503400x2504008212fefc98cf34c10b676c17f6e3b55bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x2520000xd32ca0xd340076621fbe894919882b451ce2ab2e5f8eFalse0.35582470414201184OpenPGP Public Key5.471123081038307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x3260000xe3400x8600ab7cfd72ca12feccd3e2119d4ae467c3False0.3199335354477612data4.030393245026967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x3350000x233700x23400addaf2046d8213bcddaac1c9045692e1False0.4740068151595745data6.252547672264087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            _RDATA0x3590000xf40x20067ade243d0c63bd0c48d2d7de33892feFalse0.310546875data2.4479111720682543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x35a0000x2ce240x2d000da3045c886eb606bb61f0c39710b28bbFalse0.819189453125data7.6855359501807365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x3870000x88e80x8a00d3de77e238dd659c73844edc48a1722eFalse0.3052536231884058data5.465264225679551IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_STRING0x35a0a00x2ca12data0.8229997483616153
                            RT_VERSION0x386ab40x370dataEnglishUnited States0.4465909090909091
                            DLLImport
                            USER32.dllGetUserObjectInformationW, MessageBoxW, GetProcessWindowStation
                            CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChain, CertEnumCertificatesInStore, CertCreateCertificateContext, CertFreeCertificateContext, CertEnumCRLsInStore, CertGetNameStringA, CertCloseStore, CertOpenSystemStoreA
                            WINMM.dlltimeGetTime
                            WS2_32.dllinet_ntoa, inet_addr, WSAGetOverlappedResult, select, getnameinfo, WSASend, WSARecv, getpeername, inet_ntop, gethostname, sendto, recvfrom, send, recv, freeaddrinfo, getaddrinfo, WSASetLastError, getprotobynumber, getservbyname, getservbyport, ntohl, gethostbyaddr, htonl, getsockopt, getsockname, ioctlsocket, connect, bind, accept, WSAWaitForMultipleEvents, WSASetEvent, WSAIoctl, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent, socket, closesocket, shutdown, WSAGetLastError, WSACleanup, WSAStartup, ntohs, htons, listen, gethostbyname, setsockopt
                            IPHLPAPI.DLLif_nametoindex
                            ADVAPI32.dllReportEventW, RegisterEventSourceW, DeregisterEventSource, CryptGenRandom, CryptAcquireContextA, RegQueryValueExA, RegOpenKeyExA, RegQueryValueExW, RegOpenKeyExW, RegCloseKey
                            Secur32.dllInitSecurityInterfaceA
                            bcrypt.dllBCryptGenRandom
                            KERNEL32.dllIsValidCodePage, FindFirstFileExW, FlushFileBuffers, GetFullPathNameW, GetCurrentDirectoryW, SetEndOfFile, GetConsoleOutputCP, GetTimeZoneInformation, LCMapStringW, CompareStringW, GetCommandLineW, FlsFree, GetEnvironmentStringsW, FlsGetValue, GetOEMCP, HeapReAlloc, HeapAlloc, HeapFree, FreeLibraryAndExitThread, ResumeThread, ExitThread, SetConsoleCtrlHandler, SetStdHandle, ExitProcess, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, PeekNamedPipe, GetFileInformationByHandle, GetDriveTypeW, RtlPcToFileHeader, RaiseException, EncodePointer, LoadLibraryExW, InterlockedFlushSList, GetCPInfo, FlsAlloc, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, GetStringTypeW, GetCommandLineA, FlsSetValue, HeapSize, WriteConsoleW, GetSystemDirectoryA, RtlUnwindEx, GetStartupInfoW, IsDebuggerPresent, CloseHandle, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, WaitForSingleObject, CreateEventA, CreateThread, GetCurrentThreadId, GetThreadId, Sleep, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, CreateFileW, GetFileSize, ReadFile, GetLastError, ReleaseMutex, CreateMutexA, GetModuleFileNameW, MapViewOfFile, UnmapViewOfFile, CreateFileMappingA, DeleteFileW, GetFileSizeEx, GetFileTime, WriteFile, GetCurrentProcessId, MoveFileW, LocalFree, FormatMessageA, GetTickCount64, VirtualAlloc, VirtualFree, SetFilePointerEx, SwitchToThread, RtlUnwind, FreeLibrary, GetProcAddress, LoadLibraryA, LocalAlloc, GetVersion, InitializeCriticalSectionAndSpinCount, TryEnterCriticalSection, ResetEvent, GetTickCount, GetSystemInfo, QueryPerformanceCounter, QueryPerformanceFrequency, SetWaitableTimer, GetSystemTimeAsFileTime, CreateWaitableTimerA, CreateIoCompletionPort, GetQueuedCompletionStatus, PostQueuedCompletionStatus, ReleaseSemaphore, CreateSemaphoreA, SetLastError, GetSystemTime, SystemTimeToFileTime, GetModuleHandleExW, InitializeSRWLock, ReleaseSRWLockExclusive, ReleaseSRWLockShared, AcquireSRWLockExclusive, AcquireSRWLockShared, SwitchToFiber, DeleteFiber, CreateFiberEx, FindClose, FindFirstFileW, FindNextFileW, MultiByteToWideChar, WideCharToMultiByte, GetStdHandle, GetFileType, GetModuleHandleW, GetEnvironmentVariableW, GetACP, ConvertFiberToThread, ConvertThreadToFiberEx, GetCurrentProcess, TerminateProcess, LoadLibraryW, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, InitializeSListHead
                            NameOrdinalAddress
                            bdnimbus_ask10x180001a40
                            bdnimbus_ask_async20x180001a90
                            bdnimbus_ask_bin30x180001a70
                            bdnimbus_ask_bin_async40x180001af0
                            bdnimbus_ask_json50x180001a50
                            bdnimbus_ask_json_async60x180001ac0
                            bdnimbus_dup_option70x180001d10
                            bdnimbus_file_upload80x1800477e0
                            bdnimbus_file_upload_async90x1800478c0
                            bdnimbus_free_option100x180001f20
                            bdnimbus_free_response110x180001b20
                            bdnimbus_gen_upload120x180047b40
                            bdnimbus_gen_upload_async130x180047c10
                            bdnimbus_get_option140x180001b80
                            bdnimbus_init150x1800016e0
                            bdnimbus_json_alloc160x1800264c0
                            bdnimbus_json_array_at170x180026790
                            bdnimbus_json_array_size180x180026750
                            bdnimbus_json_foreach190x180026690
                            bdnimbus_json_free200x180026520
                            bdnimbus_json_long210x180026800
                            bdnimbus_json_object220x180026550
                            bdnimbus_json_path230x180026570
                            bdnimbus_json_real240x180026880
                            bdnimbus_json_string250x1800267b0
                            bdnimbus_json_type_of260x1800268f0
                            bdnimbus_mem_upload270x180047990
                            bdnimbus_mem_upload_async280x180047a70
                            bdnimbus_push_bin290x180001a10
                            bdnimbus_push_info300x1800019b0
                            bdnimbus_push_json310x1800019e0
                            bdnimbus_set_option320x180001b40
                            bdnimbus_set_optionv330x180001b70
                            bdnimbus_text340x180001b30
                            bdnimbus_uninit350x180001830
                            checkit360x18002bab0
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:20:00
                            Start date:18/04/2024
                            Path:C:\Windows\System32\loaddll64.exe
                            Wow64 process (32bit):false
                            Commandline:loaddll64.exe "C:\Users\user\Desktop\02.dll.dll"
                            Imagebase:0x7ff79cde0000
                            File size:165'888 bytes
                            MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:1
                            Start time:03:20:00
                            Start date:18/04/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:03:20:00
                            Start date:18/04/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1
                            Imagebase:0x7ff77ae60000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:03:20:00
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:03:20:00
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",#1
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:03:20:00
                            Start date:18/04/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 3440 -s 424
                            Imagebase:0x7ff6e4750000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:10
                            Start time:03:20:00
                            Start date:18/04/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 1900 -s 416
                            Imagebase:0x7ff6e4750000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:03:20:03
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_async
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:14
                            Start time:03:20:03
                            Start date:18/04/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 4124 -s 420
                            Imagebase:0x7ff6e4750000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:16
                            Start time:03:20:06
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe C:\Users\user\Desktop\02.dll.dll,bdnimbus_ask_bin
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:18
                            Start time:03:20:06
                            Start date:18/04/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 1408 -s 416
                            Imagebase:0x7ff6e4750000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:19
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:20
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_async
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:21
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_ask_bin
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:22
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",checkit
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Qbot_2, Description: Yara detected Qbot, Source: 00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Bazar_2, Description: Yara detected Bazar Loader, Source: 00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Bazar_2, Description: Yara detected Bazar Loader, Source: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Qbot_2, Description: Yara detected Qbot, Source: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Qbot_2, Description: Yara detected Qbot, Source: 00000016.00000002.2180749909.000001A41A104000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Qbot_2, Description: Yara detected Qbot, Source: 00000016.00000002.2181091820.000001A41BB06000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Has exited:true

                            Target ID:23
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_uninit
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:24
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_text
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:26
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_optionv
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:28
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_set_option
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:29
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_json
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:32
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_info
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:33
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_push_bin
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:34
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload_async
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:35
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_mem_upload
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:36
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_type_of
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:37
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_string
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:38
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_real
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:39
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_path
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:40
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_object
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:41
                            Start time:03:20:09
                            Start date:18/04/2024
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\02.dll.dll",bdnimbus_json_long
                            Imagebase:0x7ff6c4e80000
                            File size:71'680 bytes
                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:0.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:34.7%
                              Total number of Nodes:173
                              Total number of Limit Nodes:7
                              execution_graph 44694 18004a7b0 44695 18004a7f0 44694->44695 44695->44695 44700 180001fd0 44695->44700 44697 18004a825 44699 18004a84a 44697->44699 44724 18004ac00 70 API calls 3 library calls 44697->44724 44701 180001ff1 44700->44701 44703 18000201d 44700->44703 44702 180002034 7 API calls 44701->44702 44701->44703 44704 1800020c3 EnterCriticalSection LeaveCriticalSection 44702->44704 44705 1800020bf 44702->44705 44703->44697 44725 1800195d0 44704->44725 44705->44704 44707 1800020f1 44708 1800020fe EnterCriticalSection 44707->44708 44709 1800021bf 44707->44709 44711 180002114 44708->44711 44712 180002187 44708->44712 44807 180002450 EnterCriticalSection LeaveCriticalSection DeleteCriticalSection CloseHandle 44709->44807 44711->44712 44714 180002122 LeaveCriticalSection WaitForSingleObject EnterCriticalSection 44711->44714 44720 180002179 44711->44720 44790 18002b690 EnterCriticalSection 44711->44790 44713 18000218c LeaveCriticalSection 44712->44713 44715 1800021a9 44713->44715 44717 1800021af 44713->44717 44714->44711 44715->44717 44808 180002450 EnterCriticalSection LeaveCriticalSection DeleteCriticalSection CloseHandle 44717->44808 44719 1800021d1 timeGetTime 44721 1800021f2 44719->44721 44720->44713 44722 180002277 44721->44722 44723 18002b690 _DeleteExceptionPtr 61 API calls 44721->44723 44722->44703 44723->44722 44724->44699 44726 180019611 44725->44726 44727 180019bae 44725->44727 44726->44727 44809 18000db20 16 API calls 44726->44809 44727->44707 44729 18001962f 44730 180019643 EnterCriticalSection 44729->44730 44731 180019633 44729->44731 44732 180019676 LeaveCriticalSection EnterCriticalSection 44730->44732 44733 180019660 LeaveCriticalSection 44730->44733 44731->44707 44734 1800196ab 44732->44734 44735 1800196b0 44732->44735 44733->44707 44810 180023510 EnterCriticalSection LeaveCriticalSection 44734->44810 44737 180019908 LeaveCriticalSection EnterCriticalSection 44735->44737 44738 18001974a LeaveCriticalSection EnterCriticalSection 44735->44738 44741 18002b690 _DeleteExceptionPtr 61 API calls 44735->44741 44739 180019928 44737->44739 44740 180019a6b LeaveCriticalSection 44737->44740 44743 180019761 LeaveCriticalSection 44738->44743 44822 18001b2c0 61 API calls _DeleteExceptionPtr 44739->44822 44742 18001977a 44740->44742 44760 180019a8c 44740->44760 44744 180019719 44741->44744 44813 1800240a0 EnterCriticalSection LeaveCriticalSection 44742->44813 44743->44742 44811 180022770 68 API calls 44744->44811 44746 180019782 44749 180019b56 44746->44749 44814 180023610 EnterCriticalSection LeaveCriticalSection 44746->44814 44827 180023570 EnterCriticalSection LeaveCriticalSection 44749->44827 44750 180019721 44753 18001972d 44750->44753 44754 180019900 44750->44754 44752 180019a32 44752->44740 44825 180023510 EnterCriticalSection LeaveCriticalSection 44752->44825 44758 18001986e 44753->44758 44761 180019742 44753->44761 44754->44737 44755 18002b690 _DeleteExceptionPtr 61 API calls 44787 180019b17 44755->44787 44756 18001979e 44756->44749 44815 180015d60 59 API calls 3 library calls 44756->44815 44816 180023f20 83 API calls _DeleteExceptionPtr 44758->44816 44759 18001994c 44759->44740 44759->44752 44772 180019a26 44759->44772 44773 18001998d CreateEventA LeaveCriticalSection WaitForSingleObject EnterCriticalSection CloseHandle 44759->44773 44760->44755 44812 180023570 EnterCriticalSection LeaveCriticalSection 44761->44812 44766 18001987d 44817 1800230c0 65 API calls _DeleteExceptionPtr 44766->44817 44768 180019a64 44768->44740 44769 1800197c7 44769->44749 44779 1800197d1 EnterCriticalSection 44769->44779 44770 18001988f 44818 180023510 EnterCriticalSection LeaveCriticalSection 44770->44818 44824 18001b2c0 61 API calls _DeleteExceptionPtr 44772->44824 44823 18022c440 44773->44823 44774 180019897 44819 180023330 63 API calls _DeleteExceptionPtr 44774->44819 44778 1800198ad 44820 180023570 EnterCriticalSection LeaveCriticalSection 44778->44820 44782 180019b3b LeaveCriticalSection 44779->44782 44783 180019ad0 44779->44783 44826 180016040 EnterCriticalSection LeaveCriticalSection 44782->44826 44786 180019b0d LeaveCriticalSection 44783->44786 44785 1800198b5 LeaveCriticalSection EnterCriticalSection 44821 1800232c0 63 API calls _DeleteExceptionPtr 44785->44821 44786->44787 44787->44707 44789 1800198d4 44789->44743 44791 18002b9ab LeaveCriticalSection 44790->44791 44792 18002b6de 44790->44792 44792->44791 44793 18002b6f6 GetCurrentThreadId 44792->44793 44828 1800034e0 44793->44828 44796 18002b752 LeaveCriticalSection 44832 180227e50 44796->44832 44797 18002b795 _DeleteExceptionPtr 44841 180231890 44797->44841 44802 18002b97d LeaveCriticalSection 44802->44791 44804 18002b812 44805 1800034e0 _DeleteExceptionPtr 55 API calls 44804->44805 44806 18002b90d memcpy_s 44805->44806 44806->44802 44807->44717 44808->44719 44809->44729 44810->44735 44811->44750 44812->44738 44813->44746 44814->44756 44815->44769 44816->44766 44817->44770 44818->44774 44819->44778 44820->44785 44821->44789 44822->44759 44824->44752 44825->44768 44827->44760 44829 180003508 _DeleteExceptionPtr 44828->44829 44830 180231890 _DeleteExceptionPtr 55 API calls 44829->44830 44831 18000352c 44830->44831 44831->44796 44831->44797 44833 180227e59 44832->44833 44834 180227f04 IsProcessorFeaturePresent 44833->44834 44835 18002b78b 44833->44835 44836 180227f1c 44834->44836 44835->44711 44858 1802280f8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 44836->44858 44838 180227f2f 44859 180227ed0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 44838->44859 44842 1802318d8 44841->44842 44843 18023190d 44842->44843 44845 180231930 44842->44845 44849 180231916 44843->44849 44863 1802434bc 37 API calls _invalid_parameter_noinfo 44843->44863 44846 18023197b 44845->44846 44847 18023194f 44845->44847 44861 18022c49c 37 API calls 3 library calls 44846->44861 44860 18022c49c 37 API calls 3 library calls 44847->44860 44850 180231a2f 44849->44850 44864 18022e7e0 55 API calls _invalid_parameter_noinfo 44849->44864 44853 18002b7f6 44850->44853 44865 18022e7e0 55 API calls _invalid_parameter_noinfo 44850->44865 44853->44806 44857 180237d1c GetSystemTimeAsFileTime 44853->44857 44855 180231958 44855->44849 44862 1802434bc 37 API calls _invalid_parameter_noinfo 44855->44862 44857->44804 44858->44838 44860->44855 44861->44855 44862->44849 44863->44849 44864->44850 44865->44853 44866 180238fb0 44907 180238b48 55 API calls 2 library calls 44866->44907 44868 180238ff7 44869 180239025 44868->44869 44870 18023903d 44868->44870 44918 1802397a4 11 API calls _get_daylight 44869->44918 44908 18023ecc8 44870->44908 44874 18023902a 44919 1802397c4 11 API calls _get_daylight 44874->44919 44883 180239036 44907->44868 44930 180248f6c EnterCriticalSection 44908->44930 44918->44874 44919->44883 44931 18001ea70 CreateFileW 44932 18001eb05 GetFileSizeEx CloseHandle 44931->44932 44933 18001eab9 44931->44933 44934 18002b690 _DeleteExceptionPtr 61 API calls 44933->44934 44935 18001eae5 GetLastError 44934->44935 44938 18001ed70 63 API calls _DeleteExceptionPtr 44935->44938 44937 18001eaf5 44938->44937 44939 18001e9c0 CreateFileW 44940 18001ea04 GetLastError 44939->44940 44941 18001ea23 GetFileTime 44939->44941 44940->44941 44942 18001ea38 GetLastError 44941->44942 44943 18001ea4c CloseHandle 44941->44943 44946 18001ed70 63 API calls _DeleteExceptionPtr 44942->44946 44945 18001ea4a 44945->44943 44946->44945 44947 18001e0a0 44948 18001e0b6 44947->44948 44949 18001e2de CloseHandle DeleteCriticalSection 44947->44949 44950 18001e371 44948->44950 44951 18001e0bf InitializeCriticalSection CreateEventA InitializeCriticalSection 44948->44951 44952 18001e304 44949->44952 44953 18001e161 memcpy_s 44951->44953 44957 18001e315 44952->44957 44968 180023570 EnterCriticalSection LeaveCriticalSection 44952->44968 44967 18002b560 InitializeCriticalSection 44953->44967 44956 18001e2a1 44958 180064cb0 8 API calls 44956->44958 44969 18001b7d0 76 API calls _DeleteExceptionPtr 44957->44969 44959 18001e2a6 44958->44959 44960 18001dd10 62 API calls 44959->44960 44961 18001e2ae 44960->44961 44963 18001e35a DeleteCriticalSection 44970 18002b610 EnterCriticalSection LeaveCriticalSection CloseHandle LeaveCriticalSection 44963->44970 44968->44957 44969->44963

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$DeleteInitialize$CloseCreateEventFileHandleModuleName
                              • String ID: 2.7.23.13110
                              • API String ID: 2975721612-1325857564
                              • Opcode ID: c9e64b5d5de874e64006b4208ba06e432c1c729c6a81084b4a47588ef50795a0
                              • Instruction ID: 843db7772474d0ff59f03532d8ed536115c0c93ed1a7c00b4f46c3a83eeffc16
                              • Opcode Fuzzy Hash: c9e64b5d5de874e64006b4208ba06e432c1c729c6a81084b4a47588ef50795a0
                              • Instruction Fuzzy Hash: 2881E531914B8889F7929B24FC913E573A4BBAD344F12E215ED99A2371EF6883DDC340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ThreadTimetime$CreateCurrentEventInitializeObjectSingleWait
                              • String ID: ..\src\api.c$[%s:%d][ERR] %s: WaitForSingleObject error: %d$[%s:%d][WARN] %s: request to %s took %u ms, user timeout was %u, rc = %d$__bdnimbus_ask$bdnimbus_ask_ctx_wait
                              • API String ID: 3475094464-629591516
                              • Opcode ID: 4812f55a05d24f0f1dbf1c4d37c89bdc218131ef0e698c61ea9a44a2263d4032
                              • Instruction ID: ebc46655e71ab0e75ec1055d2866893212d24fa1d815d6748513bc1fb5e29a6f
                              • Opcode Fuzzy Hash: 4812f55a05d24f0f1dbf1c4d37c89bdc218131ef0e698c61ea9a44a2263d4032
                              • Instruction Fuzzy Hash: BC718236200B4886EBE6DB61A8543DA73A1F79DB84F00C115EE4A87B95EF7DD64D8700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalFileSection$CloseCreateCurrentEnterErrorHandleLastLeaveSizeThread
                              • String ID: ..\src\win\file_io.c$[%s:%d][ERR] %s: cannot open file %S$get_file_size
                              • API String ID: 3280052567-2669655571
                              • Opcode ID: 45f929fd0e639d7aef7f5431a0a027de0373f5f0b090254454440d89c421c287
                              • Instruction ID: de0ae90fbf843a645470fe445282f392f43e2a92a7664f9cb0403a6a1208480a
                              • Opcode Fuzzy Hash: 45f929fd0e639d7aef7f5431a0a027de0373f5f0b090254454440d89c421c287
                              • Instruction Fuzzy Hash: 81115136604B8482E7919F15F44838A7361F78C7E4F448225FA9A47BA8DFBDC64CCB44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorFileLast$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 1269242970-0
                              • Opcode ID: a85eb2a73fcc0a72a07e32b41153eee4fe11c919bff0b10b37ec7f831ab55c7c
                              • Instruction ID: 14a81cfb772911ad3a2f477881eb7b80991d8a021900dc89311d75162ade7931
                              • Opcode Fuzzy Hash: a85eb2a73fcc0a72a07e32b41153eee4fe11c919bff0b10b37ec7f831ab55c7c
                              • Instruction Fuzzy Hash: 0F118235704A8482E7818F65B54439EB391F78DBE4F448221EE5A43BE8DFB8CA4D8B05
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: FileModuleName
                              • String ID: ini
                              • API String ID: 514040917-2002237032
                              • Opcode ID: 4c9063dbe73222241ec3c77244d17132559d2d8930efa9c75aa072f90e5a738f
                              • Instruction ID: 69da000c27ac28c7fb1eb5c4cab2a579709fc5789aa7c6e6cd2fdab0c6b35570
                              • Opcode Fuzzy Hash: 4c9063dbe73222241ec3c77244d17132559d2d8930efa9c75aa072f90e5a738f
                              • Instruction Fuzzy Hash: 3F01177272498C41FBE1E725E85A3DA6366F78C7C4F819111794D865A7DE6CC70DC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 123 18024591c-18024592b 124 18024592d-180245939 123->124 125 18024593b-18024594b 123->125 124->125 126 18024597e-180245989 call 1802397c4 124->126 127 180245962-18024597a RtlAllocateHeap 125->127 131 18024598b-180245990 126->131 128 18024594d-180245954 call 18024c168 127->128 129 18024597c 127->129 128->126 135 180245956-180245960 call 18024c098 128->135 129->131 135->126 135->127
                              APIs
                              • RtlAllocateHeap.NTDLL(?,?,00000000,000000018024538E,?,?,?,000000018024324B,?,?,00000000,00000001802434E6), ref: 0000000180245971
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 5e631ba9620dac36c32f22ee6cc630d1abb859b983ebe6bde77ff4686a575f65
                              • Instruction ID: 645a7a0aa2ff762d5ca64c374121d295e14282a5e18fe801c8784250173c1e0a
                              • Opcode Fuzzy Hash: 5e631ba9620dac36c32f22ee6cc630d1abb859b983ebe6bde77ff4686a575f65
                              • Instruction Fuzzy Hash: F8F06D74301E19C1FEEB57AA55883D542A35B9DBA0F0EC425498A863D3DE9CC68C8350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetVersion.KERNEL32(?,?,?,?,?,00000000,00000000,0000000180058CAB,?,?,00000000,00000001800577EA), ref: 0000000180061868
                              • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,00000000,00000000,0000000180058CAB,?,?,00000000,00000001800577EA), ref: 00000001800618A1
                              • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000000,0000000180058CAB,?,?,00000000,00000001800577EA), ref: 00000001800618AB
                              • RegOpenKeyExA.ADVAPI32(?,?,?,?,?,00000000,00000000,0000000180058CAB,?,?,00000000,00000001800577EA), ref: 00000001800618EB
                              • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000000,0000000180058CAB,?,?,00000000,00000001800577EA), ref: 00000001800618F5
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,0000000180058CAB,?,?,00000000,00000001800577EA), ref: 0000000180061A18
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000000,0000000180058CAB,?,?,00000000,00000001800577EA), ref: 0000000180061A23
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CloseErrorLastOpen$Version
                              • String ID: "DhcpNameServer"$"NameServer"$Couldn't open interfaces key, %d$Couldn't open nt key, %d$Couldn't open registry key, %d$DhcpNameServer$Didn't find any nameservers.$Didn't find nameservers in %s/%s$Found nameservers in %s/%s$Interfaces$NameServer$System\CurrentControlSet\Services\Tcpip\Parameters$System\CurrentControlSet\Services\VxD\MSTCP$interfaces_key$nt_key$win_key
                              • API String ID: 3341952248-1655250277
                              • Opcode ID: 6c3ddbc380e473385aff4a0542a0d0053935bc29c7950d62d0d2e5f648c7ada8
                              • Instruction ID: 50693aa03402055f010696b665c53ed984b5e91d536782728a5d60e5f749edf0
                              • Opcode Fuzzy Hash: 6c3ddbc380e473385aff4a0542a0d0053935bc29c7950d62d0d2e5f648c7ada8
                              • Instruction Fuzzy Hash: 46719230208F4D99EA929BA1AC443DA2363F71DBC1F94C012B96A976E5DFB8C34DC341
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 268 1800195d0-18001960b 269 180019611-180019616 268->269 270 180019bae-180019bbd 268->270 269->270 271 18001961c-18001961e 269->271 272 18001962a-180019631 call 18000db20 271->272 273 180019620-180019624 271->273 276 180019643-18001965e EnterCriticalSection 272->276 277 180019633-180019642 272->277 273->270 273->272 278 180019676-1800196a9 LeaveCriticalSection EnterCriticalSection 276->278 279 180019660-180019675 LeaveCriticalSection 276->279 280 1800196ab call 180023510 278->280 281 1800196b0-1800196ce 278->281 280->281 283 1800196d4-1800196ef 281->283 284 180019908-180019922 LeaveCriticalSection EnterCriticalSection 281->284 285 1800196f1-180019727 call 18002b690 call 180022770 283->285 286 18001974a-18001975b LeaveCriticalSection EnterCriticalSection 283->286 287 180019928-18001992e 284->287 288 180019a6b-180019a86 LeaveCriticalSection 284->288 313 18001972d-180019732 285->313 314 180019900 285->314 292 180019761-180019777 LeaveCriticalSection 286->292 293 18001993b 287->293 294 180019930-180019935 287->294 290 18001977a-180019786 call 1800240a0 288->290 291 180019a8c-180019aab call 18000b950 288->291 304 180019b56 290->304 305 18001978c-1800197aa call 180023610 290->305 308 180019b85-180019ba9 call 18002b690 291->308 292->290 295 180019940-180019950 call 18001b2c0 293->295 294->293 298 180019937-180019939 294->298 310 180019956-180019958 295->310 311 180019a4c-180019a4e 295->311 298->295 312 180019b5e-180019b80 call 180023570 call 18000b950 304->312 305->312 324 1800197b0-1800197cb call 180015d60 305->324 329 180019b17-180019b3a 308->329 310->311 318 18001995e-180019966 310->318 311->288 316 180019a50-180019a5a 311->316 312->308 320 180019738-18001973c 313->320 321 18001986e-1800198fb call 180023f20 call 1800230c0 call 180023510 call 180023330 call 180023570 LeaveCriticalSection EnterCriticalSection call 1800232c0 313->321 314->284 316->288 323 180019a5c-180019a64 call 180023510 316->323 318->288 325 18001996c-180019973 318->325 320->321 327 180019742-180019745 call 180023570 320->327 321->292 323->288 324->312 343 1800197d1-180019837 324->343 332 180019979-180019987 call 18022c454 325->332 333 180019a40-180019a4a 325->333 327->286 348 180019a26-180019a34 call 18001b2c0 332->348 349 18001998d-180019a21 CreateEventA LeaveCriticalSection WaitForSingleObject EnterCriticalSection CloseHandle call 18022c440 332->349 333->311 346 180019842-180019847 343->346 347 180019839-18001983e 343->347 351 180019857-18001985a 346->351 352 180019849-180019855 346->352 347->346 362 180019a36-180019a38 348->362 363 180019a3a 348->363 349->348 356 180019ab0-180019ab2 351->356 357 180019860-180019869 351->357 352->351 360 180019ab4-180019ab9 356->360 361 180019ac0-180019ace EnterCriticalSection 356->361 357->361 360->361 365 180019b3b-180019b54 LeaveCriticalSection call 180016040 361->365 366 180019ad0-180019af3 361->366 362->316 363->333 365->329 369 180019af5-180019b08 call 180052860 366->369 370 180019b0d-180019b11 LeaveCriticalSection 366->370 369->370 370->329
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID: ..\src\user_context.c$[%s:%d] %s: [uc:%p] global.last_renew > rt_setts.lutime$[%s:%d][WARN] %s: service:%s, returning %d (%s)$request_perform
                              • API String ID: 2978645861-3816031580
                              • Opcode ID: 27be6d4d201fdc7913223c7abfdb0b04bf4603c09d1492bda433a85f53b958b2
                              • Instruction ID: f743bb3ced1cc7ed3f1d4770ce890aef556ea09a39cdd427f4c724a96c1c67e5
                              • Opcode Fuzzy Hash: 27be6d4d201fdc7913223c7abfdb0b04bf4603c09d1492bda433a85f53b958b2
                              • Instruction Fuzzy Hash: EAF14836205F4886EB929F55F89039A73A4FB8DB94F548011EE9E877A4DF38CA4DC740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 375 18004fde0-18004fe1a 376 18004fe20-18004fe4b GetSystemDirectoryA 375->376 377 1800501a9-1800501ab 375->377 379 18004ffc5-180050023 htons call 180050f00 376->379 380 18004fe51-18004fe5d 376->380 378 180050191-1800501a8 call 180227e50 377->378 388 180050025-18005002f 379->388 389 180050070-1800500d7 htons call 18004d020 socket 379->389 380->379 381 18004fe63-18004fe6a 380->381 384 18004fe70-18004fe78 381->384 384->384 387 18004fe7a-18004fe8b 384->387 390 18004fe90-18004fe98 387->390 388->389 391 180050031-18005003a 388->391 398 180050117-18005012d socket 389->398 399 1800500d9-1800500ed connect 389->399 390->390 393 18004fe9a-18004fecf LoadLibraryA 390->393 391->389 394 18005003c-180050046 391->394 393->379 396 18004fed5-18004fef6 GetProcAddress 393->396 394->389 397 180050048-180050054 394->397 402 18004ff9e-18004ffb2 FreeLibrary 396->402 403 18004fefc-18004ff14 call 18022c454 396->403 397->389 404 180050056-18005006c htonl 397->404 400 18005016f-180050189 398->400 401 18005012f-180050145 connect 398->401 405 18005010e-180050111 closesocket 399->405 406 1800500ef-180050103 getsockname 399->406 400->378 407 180050166-180050169 closesocket 401->407 408 180050147-18005015b getsockname 401->408 410 18004ffb4-18004ffb7 call 18022c440 402->410 411 18004ffbc-18004ffbf 402->411 403->402 418 18004ff1a-18004ff35 403->418 404->389 405->398 406->405 412 180050105-180050109 call 18004fb50 406->412 407->400 408->407 413 18005015d-180050161 call 18004fb50 408->413 410->411 411->379 411->400 412->405 413->407 420 18004ff37-18004ff4e call 18022c440 call 18022c454 418->420 421 18004ff68-18004ff6d 418->421 420->402 432 18004ff50-18004ff64 420->432 421->402 422 18004ff6f 421->422 424 18004ff72-18004ff79 422->424 426 18004ff92-18004ff99 424->426 427 18004ff7b 424->427 426->424 431 18004ff9b 426->431 430 18004ff80-18004ff90 call 18004fb50 427->430 430->426 431->402 432->421
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Libraryclosesocketconnectgetsocknamehtonssocket$AddressDirectoryFreeLoadProcSystemhtonl
                              • String ID: %u.%u.%u.%u%c$.dll$18.244.0.188$2001:4860:b002::68$GetAdaptersAddresses
                              • API String ID: 4020265194-1616330253
                              • Opcode ID: 0a18d030f62aa8def49b1ca51848812d0ba008792f5fbf028ec03468da30c1ce
                              • Instruction ID: 5cfcbf66ea73a11519a8c437ba55c52334034679c7e324d6e27435a90e7f9bf1
                              • Opcode Fuzzy Hash: 0a18d030f62aa8def49b1ca51848812d0ba008792f5fbf028ec03468da30c1ce
                              • Instruction Fuzzy Hash: 3AB1D631700B8886FBA2CF21D4543EEB3A1FB49B84F548126EA4947B94EF79CA4DC744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180023F31,?,?,?,?,?,000000018001987D), ref: 0000000180009221
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180023F31,?,?,?,?,?,000000018001987D), ref: 0000000180009234
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180023F31,?,?,?,?,?,000000018001987D), ref: 0000000180009473
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180023F31,?,?,?,?,?,000000018001987D), ref: 00000001800094C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\dns_client.c$Accept Truncate:$Disable probe request:$[%s:%d] %s: %d$[%s:%d][ERR] %s: No DNS servers found!$[%s:%d][ERR] %s: evdns_base_set_option( dns->evdns_base, "Accept Truncate:", "1" ) failed $[%s:%d][ERR] %s: evdns_base_set_option( dns->evdns_base, "attempts:", n ) failed $[%s:%d][ERR] %s: evdns_base_set_option( dns->evdns_base, "initial-probe-timeout", "1") failed $[%s:%d][ERR] %s: evdns_base_set_option( dns->evdns_base, "max-timeouts:", "1" ) failed $[%s:%d][ERR] %s: evdns_base_set_option( dns->evdns_base, "randomize-case", r ? "1" : "0" ) failed $[%s:%d][ERR] %s: evdns_base_set_option( dns->evdns_base, "timeout", DNS_CLIENT_TIMEOUT_STR ) failed $attempts:$dns_client_init$get_randomize_option$initial-probe-timeout$max-timeouts:$randomize-case$timeout
                              • API String ID: 266293576-1865272581
                              • Opcode ID: d965125f91bd393bc072160e9fc795a53708ffca34d92fdd2ae5516fba63296a
                              • Instruction ID: 7cdc436ee3a4f6ff7606c3f3e86b83edbc338494da73fbdc1dea5e3e18587f39
                              • Opcode Fuzzy Hash: d965125f91bd393bc072160e9fc795a53708ffca34d92fdd2ae5516fba63296a
                              • Instruction Fuzzy Hash: 4F816932210B4991EBD3DB60E8567D933A1FB4C788F40D116B94AAB6A5DFB9C71CC344
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 496 180006760-1800067e6 call 18000c780 call 18002b690 501 1800067f0-180006804 call 1800056c0 496->501 504 180006ab9-180006ae4 call 18002b690 501->504 505 18000680a-180006814 501->505 514 180006ae7-180006aee 504->514 506 180006816-180006847 call 18000b950 call 18002b690 call 18001be50 505->506 507 18000684c-180006856 505->507 506->507 511 18000685c-180006864 507->511 512 1800068fe-180006907 call 180007710 507->512 515 1800068f2-1800068fc 511->515 516 18000686a 511->516 522 180006944-180006952 512->522 531 180006909-180006912 call 180007820 512->531 519 180006b3b-180006b8d EnterCriticalSection call 18002b690 514->519 520 180006af0 514->520 515->522 521 180006870-180006872 516->521 542 180006bb3-180006bbc 519->542 543 180006b8f 519->543 528 180006af0 call 180022460 520->528 529 180006874-18000687c 521->529 530 18000687e-180006883 521->530 526 180006961-18000696b 522->526 527 180006954-18000695b 522->527 535 180006971-180006978 526->535 536 180006a1d-180006a27 526->536 527->526 534 180006aa1 527->534 537 180006af5-180006afb 528->537 529->530 538 180006885-180006891 529->538 530->538 539 180006893-18000689b 530->539 531->522 552 180006914-18000693f call 18000b950 call 18002b690 531->552 550 180006aa8 call 180005a40 534->550 546 180006980-18000698d 535->546 544 180006a51 536->544 545 180006a29-180006a4f 536->545 537->519 547 180006afd-180006b36 call 18002b690 call 18000ccc0 call 18000d6b0 537->547 538->521 538->539 548 1800068d7-1800068dc 539->548 549 18000689d 539->549 555 180006bc3-180006bd9 SetEvent 542->555 556 180006bbe-180006bc1 542->556 553 180006b96-180006ba7 SetEvent 543->553 554 180006a57-180006a5f 544->554 545->554 558 180006a05-180006a0d 546->558 559 18000698f-1800069ff call 18002b690 546->559 547->519 548->521 557 1800068de-1800068f0 548->557 561 1800068a0-1800068a3 549->561 551 180006aad-180006ab1 550->551 551->519 565 180006ab7 551->565 552->522 553->553 567 180006ba9 553->567 568 180006a61 call 1800079e0 554->568 569 180006a66-180006a6f call 180006370 554->569 570 180006bdf-180006be2 555->570 556->555 556->570 557->522 558->546 562 180006a13 558->562 559->558 586 180006a01 559->586 563 1800068a5-1800068ad 561->563 564 1800068af-1800068ba 561->564 562->536 563->564 573 1800068bc-1800068be 563->573 564->561 564->573 565->514 567->542 568->569 569->534 592 180006a71-180006a9c call 18000b950 call 18002b690 569->592 577 180006be8-180006bee 570->577 578 180006d7e-180006d85 570->578 573->548 581 1800068c0-1800068d0 call 180007bd0 573->581 584 180006c43-180006c45 577->584 585 180006bf0-180006bf3 577->585 588 180006d8a-180006d99 LeaveCriticalSection 578->588 608 1800068d2 581->608 609 1800068d4 581->609 589 180006d01-180006d0e 584->589 590 180006c4b-180006c64 timeGetTime 584->590 585->584 593 180006bf5-180006bff 585->593 586->558 595 180006da9-180006daf 588->595 596 180006d9b-180006da4 call 180008ee0 588->596 602 180006cb1-180006ce2 589->602 603 180006d10-180006d19 589->603 599 180006c66-180006c76 590->599 600 180006c7a-180006cab 590->600 592->534 605 180006c01-180006c09 593->605 606 180006c14-180006c3e call 18002b690 593->606 595->501 598 180006db5-180006e0a call 18002b690 call 180227e50 595->598 596->595 599->600 600->602 610 180006ce4-180006cff 602->610 611 180006d5a-180006d73 602->611 603->602 612 180006d1b-180006d3c 603->612 605->606 614 180006c0b-180006c0e 605->614 606->588 608->609 609->548 618 180006d75-180006d78 610->618 611->618 612->618 619 180006d3e-180006d58 612->619 614->606 618->578 619->618
                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                                • Part of subcall function 00000001800056C0: InitializeCriticalSection.KERNEL32 ref: 0000000180005704
                                • Part of subcall function 00000001800056C0: CreateEventA.KERNEL32 ref: 0000000180005714
                                • Part of subcall function 00000001800056C0: EnterCriticalSection.KERNEL32 ref: 000000018000578E
                                • Part of subcall function 00000001800056C0: timeGetTime.WINMM ref: 000000018000579D
                              • EnterCriticalSection.KERNEL32 ref: 0000000180006B42
                              • SetEvent.KERNEL32 ref: 0000000180006B9A
                              • SetEvent.KERNEL32 ref: 0000000180006BD3
                              • LeaveCriticalSection.KERNEL32 ref: 0000000180006D91
                                • Part of subcall function 000000018001BE50: EnterCriticalSection.KERNEL32(?,?,?,?,0000100100000200,000000018000684C), ref: 000000018001BE5F
                                • Part of subcall function 000000018001BE50: timeGetTime.WINMM(?,?,?,?,0000100100000200,000000018000684C), ref: 000000018001BEFC
                                • Part of subcall function 000000018001BE50: LeaveCriticalSection.KERNEL32(?,?,?,?,0000100100000200,000000018000684C), ref: 000000018001BF0F
                              • timeGetTime.WINMM ref: 0000000180006C4B
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$EventLeaveTimetime$CreateCurrentInitializeThread
                              • String ID: ..\src\bootstrap.c$[%s:%d] %s: %s: { %s: %d }$[%s:%d] %s: APPLYING NULL RUNTIME SETTINGS !!!$[%s:%d] %s: RUN AGAIN !!! ( restart bootstrap process )$[%s:%d] %s: bootstrap thread exiting$[%s:%d] %s: bootstrap thread started$[%s:%d] %s: global_state.benchmark_status = %d$[%s:%d] %s: prev error : %s, try reloading system certs$[%s:%d][ERR] %s: get_servers_list_from_bootstrap rc = %d ( %s) $[%s:%d][ERR] %s: order_benchmark rc = %d ( %s) $[%s:%d][WARN] %s: event_context_init failed %d$apply_bdnc_config_option$bootstrap
                              • API String ID: 309211180-4209523062
                              • Opcode ID: 4481ecb29ffc6b536eedb4c4984aa92f8ec8390a69fb9a9f1b93b421f666f533
                              • Instruction ID: 22e00712906eb4fa8e6d6b09bcf7699b900db35e0bb7b7f4762e6890db3f90e1
                              • Opcode Fuzzy Hash: 4481ecb29ffc6b536eedb4c4984aa92f8ec8390a69fb9a9f1b93b421f666f533
                              • Instruction Fuzzy Hash: 15126935A00A488AE7E7DB14E8553E933A6B38C784F44D116EE4A873A5DF79CB49C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Create$EnterEventLeaveThread$AllocCloseHandleObjectSingleWait
                              • String ID: ..\src\global_state.c$[%s:%d] %s: first time initialization$[%s:%d] %s: setup_network_awareness = %p$[%s:%d] %s: tls_key %x$global_state_init
                              • API String ID: 1335466951-2822856998
                              • Opcode ID: 5b8900a781346861ece7d277ea429cfe35120803ada4f9a01b0f5194d2b7a4c7
                              • Instruction ID: 5ad6e82f9b377ccd21d59a6e926ca7004b2a21ed97ba1f26592f93088c1d0b29
                              • Opcode Fuzzy Hash: 5b8900a781346861ece7d277ea429cfe35120803ada4f9a01b0f5194d2b7a4c7
                              • Instruction Fuzzy Hash: 63A14434200A4986FBD2DB20F8957D973A5BB8D3A4F05C625F86AA23E1DF39C34D8745
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CertStore$Enum$CertificatesCriticalSection$CurrentEnterLeaveOpenSystemThread
                              • String ID: ..\src\ssl\ssl_ctx.c$ROOT$[%s:%d] %s: '%s' %s$[%s:%d] %s: Added %d certificates from a total of %d$[%s:%d][ERR] %s: CertOpenSystemStore returned NULL$[%s:%d][ERR] %s: d2i_X509 error on %p of size %d!!!$add_windows_certs$hcert_2_x509_store$not added$x509_cert_dump
                              • API String ID: 3739351216-1269581511
                              • Opcode ID: a9f4c900b65edde4121199c8f1765d23a1735cb14fc9985a2fb940b028b6c793
                              • Instruction ID: f94e1e82e5a533933c28fd5015221c649a172d872045eb909d6649a0253eb7d2
                              • Opcode Fuzzy Hash: a9f4c900b65edde4121199c8f1765d23a1735cb14fc9985a2fb940b028b6c793
                              • Instruction Fuzzy Hash: 6D615F31305B8881EBA69B11E4153DA73A1FB4DBC4F44842AEA8E07B95EFBDC24DC744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 808467561-2761157908
                              • Opcode ID: f807d3a1488a21b4a9ecd99756f5715bf8b4cf850c1f9ec16a32a0ebbd74b94e
                              • Instruction ID: 973a56cee8e1ce68f72cc750fb74a428385219353f6417a82e18618aa775506c
                              • Opcode Fuzzy Hash: f807d3a1488a21b4a9ecd99756f5715bf8b4cf850c1f9ec16a32a0ebbd74b94e
                              • Instruction Fuzzy Hash: CCB2E772710A988BE7E6CF68D4887ED77B2F348788F529215DA0657A84DFB4D708CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$Event
                              • String ID: ..\src\upload\upload.c$[%s:%d] %s: calling user_context_signal_uninit$[%s:%d] %s: signal user thread (due to BDNC_CTX_F_WAIT_4_UPLOADS)$[%s:%d] %s: upload->active_req->uc = NULL;$katastif/manager$upload_cancel_context_req
                              • API String ID: 204801070-3387526285
                              • Opcode ID: d8d10ac81dc638fe6685ab753b90bad6cfb65405325f13776b30c7e1c7a6ad8b
                              • Instruction ID: 7c05e3d8ff5dcce25a8e1f6d3fab9ec8ddb5ca7f3a214d1a3766e1aaadf0d831
                              • Opcode Fuzzy Hash: d8d10ac81dc638fe6685ab753b90bad6cfb65405325f13776b30c7e1c7a6ad8b
                              • Instruction Fuzzy Hash: 47C18D32201F8885EB92DF26E4943EE73A5F788B88F45C425EE4947795CF38CA59D344
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThread
                              • String ID: ..\src\bdnc_conn.c$[%s:%d] %s: finish with error %d for conn %p, pending_cb: %d$[%s:%d] %s: finish with error %d for conn %p, pending_cb: %d, response: %p$[%s:%d][ERR] %s: primary not set$bdnc_conn_read_cb$bdnc_conn_start_ssl$l
                              • API String ID: 2351996187-4163792662
                              • Opcode ID: 4f3cc9183cf747ac574d1dab44faca41f401c34a52d10e0e5ccd87735939675e
                              • Instruction ID: 23ca67113a03f507704387ceb1ed6af91a2417c49003db995d7259e8f427f4fe
                              • Opcode Fuzzy Hash: 4f3cc9183cf747ac574d1dab44faca41f401c34a52d10e0e5ccd87735939675e
                              • Instruction Fuzzy Hash: 55D18D76200B8986EBA3DF21D4513EA33A1F788BD8F548122FE4947796DF78C659C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: closesocket
                              • String ID: ..\src\bdnc_conn.c$[%s:%d] %s: [%p] cancel deferred$[%s:%d] %s: finish with error %d for conn %p, pending_cb: %d$bdnc_conn_cancel_pending$bdnc_conn_close$bdnc_conn_first_connect_event_cb$}
                              • API String ID: 2781271927-2627043027
                              • Opcode ID: 7fc59c2ff859337547ea90b7fbb311a5e87a8f8733c62fd8407955444834dfcb
                              • Instruction ID: d1beeda486adc507a534d285dbe26d48ae6f0eb5da7a210d837fcc38e7860438
                              • Opcode Fuzzy Hash: 7fc59c2ff859337547ea90b7fbb311a5e87a8f8733c62fd8407955444834dfcb
                              • Instruction Fuzzy Hash: 39E16F31211B9882EBE7DF65E4553E933A1FB8CBC4F548136BA4A47696CF78C649C380
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: AES-256-CTR$CTR-DRBG$HMAC$cipher$crypto\rand\rand_lib.c$digest$mac$properties$rand_new_drbg$reseed_requests$reseed_time_interval
                              • API String ID: 0-2016530501
                              • Opcode ID: eb162fb543e1a40bd0f4c203ca3cd53d081e2c07a414a47c6fea23810da1aaef
                              • Instruction ID: 0f2127ca39f0a023408fd4521642cb8b205a58c50436712588cd78e25827142a
                              • Opcode Fuzzy Hash: eb162fb543e1a40bd0f4c203ca3cd53d081e2c07a414a47c6fea23810da1aaef
                              • Instruction Fuzzy Hash: CC818E72A14B8D82EBA2DF24D9113E96360FB9D784F44E211EE4D13A97EF74D289C700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                              • String ID: .dll$GetAdaptersAddresses
                              • API String ID: 582185067-2500582564
                              • Opcode ID: ae7b3a7f799668552c02c7bea7c440d77f657607e626616e438217d5028b37c3
                              • Instruction ID: 0ebc1fcf9cf3d1b0d991d310005420524196b9b244dbe1e4d58269070a15d413
                              • Opcode Fuzzy Hash: ae7b3a7f799668552c02c7bea7c440d77f657607e626616e438217d5028b37c3
                              • Instruction Fuzzy Hash: 7D51A431605B8886EBB2DF21E4943EAB3A1F74DBC4F498115EA4D4BB94DF79C609C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: bf1ea08ba6c04a60860547c9da8ac28574935d2b4987126833dfed521a95f34e
                              • Instruction ID: 7d60bbc265b93d377ac29006bb71f44d3c66d4126c01a303d965aaacf63ca65d
                              • Opcode Fuzzy Hash: bf1ea08ba6c04a60860547c9da8ac28574935d2b4987126833dfed521a95f34e
                              • Instruction Fuzzy Hash: DB319F32214F8486DBA1CF25E8843DE73A1F78D758F544126EA8E43B94EF78C259CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: memcpy_s
                              • String ID:
                              • API String ID: 1502251526-3916222277
                              • Opcode ID: 0a92a3545022d5413d45cc527e772310ed2624658a47654af9623816e738ea1b
                              • Instruction ID: 72570f642db5a148e0d02af25445a132e8b6c81d9b4f5bfb8ba34872a80729a9
                              • Opcode Fuzzy Hash: 0a92a3545022d5413d45cc527e772310ed2624658a47654af9623816e738ea1b
                              • Instruction Fuzzy Hash: EFC1087271468987EBA1CF19E04CB9AF79AF38C788F46C125DB4647B64DB78D909CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalInitializeSection$CreateEvent
                              • String ID: 2.7.23.13110
                              • API String ID: 57637462-1325857564
                              • Opcode ID: f30e2d7db92ed3dd10bb114c69df933067544c71c89ec14a3a83cfe4ebd590a8
                              • Instruction ID: 26397df0cc9595524aa01511255dce5330eb7df4e4a16f6ebaab9d16fe4b3c02
                              • Opcode Fuzzy Hash: f30e2d7db92ed3dd10bb114c69df933067544c71c89ec14a3a83cfe4ebd590a8
                              • Instruction Fuzzy Hash: 37519531915F8889E2828B24F8853E573A4BBAD345F22E315ED9962331EF7953D98740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018004F700: GetSystemDirectoryA.KERNEL32 ref: 000000018004F728
                                • Part of subcall function 000000018004F700: LoadLibraryA.KERNEL32 ref: 000000018004F7A4
                              • GetProcAddress.KERNEL32(?,?,?,?,?,?,00000000,00000001800517FD), ref: 0000000180074526
                              • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00000000,00000001800517FD), ref: 0000000180074567
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: SystemTime$AddressDirectoryFileLibraryLoadProc
                              • String ID: GetSystemTimePreciseAsFileTime$kernel32.dll
                              • API String ID: 3557092845-706389432
                              • Opcode ID: 55cef4bf8f9c2541f9799cbab292375fa13d88d890a53b068a3ee3544b9ca059
                              • Instruction ID: 6cc047d9855c1ea3508eab19a221c0a26c3ddc9b8ce88b7f90a3ab2d865e91b2
                              • Opcode Fuzzy Hash: 55cef4bf8f9c2541f9799cbab292375fa13d88d890a53b068a3ee3544b9ca059
                              • Instruction Fuzzy Hash: ED118172B06A0C87FEDACB99A8543A46391BB4CBC5F44C525ED1E4A3E5EF2D825CC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • Unable to seed random number generator; DNS can't run., xrefs: 00000001800576B5
                              • Unrecognized flag passed to evdns_base_new(). Assuming you meant EVDNS_BASE_INITIALIZE_NAMESERVERS., xrefs: 00000001800577C0
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: Unable to seed random number generator; DNS can't run.$Unrecognized flag passed to evdns_base_new(). Assuming you meant EVDNS_BASE_INITIALIZE_NAMESERVERS.
                              • API String ID: 0-2473713154
                              • Opcode ID: 011aeaf54e7f0377a30dae391b4c4ae5739835a86721212c16abfd16ae44365b
                              • Instruction ID: 4150bd5637e90c64b7ceca6f0b373cccffa9058bbfbb566725ef4434246185f1
                              • Opcode Fuzzy Hash: 011aeaf54e7f0377a30dae391b4c4ae5739835a86721212c16abfd16ae44365b
                              • Instruction Fuzzy Hash: 4FC18B32301B4886EAAA9F25E1503E973A1FB48BC4F58C425FB4D17786DF7AD668D340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Crypt$AcquireContextErrorLastRandom
                              • String ID:
                              • API String ID: 738925053-0
                              • Opcode ID: 24e27a3411532a7dc29c23013b4d8dd64f0075c8f67cbcc84a1b24e7ee847d02
                              • Instruction ID: d8c051dbc21a32a3005a5b716eea6e9132cbdff3dac1c79d32f264caec558372
                              • Opcode Fuzzy Hash: 24e27a3411532a7dc29c23013b4d8dd64f0075c8f67cbcc84a1b24e7ee847d02
                              • Instruction Fuzzy Hash: 255194311081E84DF7A38F209855BE53F60B76B706FA4C296E9D58229BDE6CC34DC710
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorLast$bind
                              • String ID:
                              • API String ID: 234189176-0
                              • Opcode ID: 7c01bfd57b6bc5f73a7db8e90d4b76400e062e38255e765a05437eab505e4cb9
                              • Instruction ID: 5e768571466bef01367656bf08ac5beaf0dd5f41de04be0e9b8119f92e001d1a
                              • Opcode Fuzzy Hash: 7c01bfd57b6bc5f73a7db8e90d4b76400e062e38255e765a05437eab505e4cb9
                              • Instruction Fuzzy Hash: E931B532A0878881F3A29B21E8557FA73B1F799784F50D225FA8986655DF7DC6CC8700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htonl
                              • String ID: %u.%u.%u.%u%c
                              • API String ID: 2009864989-2006965413
                              • Opcode ID: 5fe733ff000cc33adcc262e9e83b27277e124f5c6a553b22afdb2759a63767be
                              • Instruction ID: 651051a97b173696949b5a0d4cbb0da7994fd8400fd85785f6a78117e6105f74
                              • Opcode Fuzzy Hash: 5fe733ff000cc33adcc262e9e83b27277e124f5c6a553b22afdb2759a63767be
                              • Instruction Fuzzy Hash: C4B1253270099C89FB92CF64D5843FC3BA2E719398F458167FE8912AD9DA78CA49C304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionRaise_clrfp
                              • String ID:
                              • API String ID: 15204871-0
                              • Opcode ID: bac15ef45a1164744c7e78e8d9d0c0cfd8c04e782fd59b0ed117bdadee376b64
                              • Instruction ID: b6f5c1a7e3f664ec92f6c6426feea24630b21bce02c6b1ee4c6fe22bcdbd34f4
                              • Opcode Fuzzy Hash: bac15ef45a1164744c7e78e8d9d0c0cfd8c04e782fd59b0ed117bdadee376b64
                              • Instruction Fuzzy Hash: 0CB17E77210B48CBEB96CF29C88939C77A1F388B58F14C911EA5A837A4CB76D955CB04
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: SSL_CTX_new_ex$ssl\ssl_lib.c
                              • API String ID: 0-2988157636
                              • Opcode ID: ebaac064148a911b11938bf1d40d822eeb55ab9a9f43339b01bd62b55be2a62d
                              • Instruction ID: 15acb52419878a5aafea43a40a61abb358e33828e9d6474d67a671f098a02e92
                              • Opcode Fuzzy Hash: ebaac064148a911b11938bf1d40d822eeb55ab9a9f43339b01bd62b55be2a62d
                              • Instruction Fuzzy Hash: B6C16C71201B8981FBD2AB61E8527DD2295BB4CBC4F84C235BE494A7D6EF38C718C764
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: e+000$gfff
                              • API String ID: 0-3030954782
                              • Opcode ID: 7eff799d11099437d6d13ca5db6772bff11bc2e710af26e6e4c7a2c0146afb5c
                              • Instruction ID: 537e0de2b0e44bf0fd93c7af20e339dd485944ebf3bda38d6219f646516358e3
                              • Opcode Fuzzy Hash: 7eff799d11099437d6d13ca5db6772bff11bc2e710af26e6e4c7a2c0146afb5c
                              • Instruction Fuzzy Hash: CC518C33714BD846E7668A359849799BBB2F358B94F4AD221DB5447AC1CFB9C50CC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: f956c90f9fe8652eefa3aa77972db50812c8206d6400dd1c207db10f13c53667
                              • Instruction ID: 0f8a3d84a55feef313639af65a22a038852416ee79c8f6226130d50376422e31
                              • Opcode Fuzzy Hash: f956c90f9fe8652eefa3aa77972db50812c8206d6400dd1c207db10f13c53667
                              • Instruction Fuzzy Hash: 78D12B33604B8486E7F6CF15A4C83EA66B2F74D794F15C225DB8947B99CFB8C6488B00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: gfffffff
                              • API String ID: 0-1523873471
                              • Opcode ID: 22029e7076e556fd254b6f45e7f1098ea2c1ad0c83a818786026e6e1d0ca2266
                              • Instruction ID: 4af847099146470aa4bf9895e291f3b661df1d43c6e8a0fbd4f83f8660aa7eed
                              • Opcode Fuzzy Hash: 22029e7076e556fd254b6f45e7f1098ea2c1ad0c83a818786026e6e1d0ca2266
                              • Instruction Fuzzy Hash: 84A16673704BC886EBA6CB26E4857DD7BA2E358B84F06C122CE8947785DE7DC619C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID: 0-3916222277
                              • Opcode ID: 44b266139db213409e27f082323fa97626a6eff5a34a577b130d5635c6366186
                              • Instruction ID: 32fea846ee6f511e21983f07c9924b355861754c26a299270fee3da7a45953dc
                              • Opcode Fuzzy Hash: 44b266139db213409e27f082323fa97626a6eff5a34a577b130d5635c6366186
                              • Instruction Fuzzy Hash: 59B1A37220475885EBE68FB9C0593AD7BA2F30EB48F18811ACA4E07399CFB5C648D755
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0123456789abcdef
                              • API String ID: 0-1757737011
                              • Opcode ID: be88a3afbba0f17b173ea0ca8475850bc60dc4020012016c693cf99724b8eeeb
                              • Instruction ID: da56144e33ff046463a4c48d80442d18c72364ad91b7bc63f228eae777aa0ff2
                              • Opcode Fuzzy Hash: be88a3afbba0f17b173ea0ca8475850bc60dc4020012016c693cf99724b8eeeb
                              • Instruction Fuzzy Hash: E1514D6721D6F44EE7068B6A04754FC3EA5C03A60671D83DAEBD2C6743E01DCB59EB21
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 22e7d4b092d2c5fbf7f54d0f32176c11fb0e9140409f468464bcc754d8431844
                              • Instruction ID: bfc66b18138f0aeec57e254b25644582ee023f3e163930aa58f2175b209e4fe5
                              • Opcode Fuzzy Hash: 22e7d4b092d2c5fbf7f54d0f32176c11fb0e9140409f468464bcc754d8431844
                              • Instruction Fuzzy Hash: D712A3B7B3816057C35DCB29EC52F9A36A2B7A4308B49D428E706D3F04E63DFA159B44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2c136c7238871fdd7bc024aa840689cbd01d6ce196475d0fa830f4ce16f3cd04
                              • Instruction ID: cf153fbc2e246bc81ba228e4b4cc188e71397a4f982eae1b35fbc47da3a1c66c
                              • Opcode Fuzzy Hash: 2c136c7238871fdd7bc024aa840689cbd01d6ce196475d0fa830f4ce16f3cd04
                              • Instruction Fuzzy Hash: DCE1B42330A2C88FD75B8E5C984039E7F61E76AB84F49C16DDA8547782CA29D61FC351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 25873a9320c9abbac7544f4a04f2d8bd13f5afd92f1841d055a7b86d96c7861f
                              • Instruction ID: 658807cee18b0fe1fd34d573135d25ea54df5214d6c62d6072ee9dec495a55d3
                              • Opcode Fuzzy Hash: 25873a9320c9abbac7544f4a04f2d8bd13f5afd92f1841d055a7b86d96c7861f
                              • Instruction Fuzzy Hash: 85D1F53260060886EBEACF5980A87AD77A2F70CF64F52C215DF49073A5DFB4CA5AC754
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a1d719c3814f7e428ad1fab7630ae044cd5fadb905fa39e0a45fdf94a570764a
                              • Instruction ID: 2330ceebf6aae6f0bedab20968a777e66a988ec3e4668880bf52da254e064176
                              • Opcode Fuzzy Hash: a1d719c3814f7e428ad1fab7630ae044cd5fadb905fa39e0a45fdf94a570764a
                              • Instruction Fuzzy Hash: 72C1D3326141E44BD28AEB29E45AA7A7791F78C346FD8801AFB8B47786C73CE118D710
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 08f7097b4930c6a8404e2d9a7fb31dec1924b76d74107497c130d3cab46df2a7
                              • Instruction ID: 8a356fb15d05a04bd1ab2996ab795ed530f884b0cb2f62537e07995056fdbd7f
                              • Opcode Fuzzy Hash: 08f7097b4930c6a8404e2d9a7fb31dec1924b76d74107497c130d3cab46df2a7
                              • Instruction Fuzzy Hash: A0B117236162C88BD716CB6D984039E7F60F366B84F48C359DB8697B52CA38E61AC351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6b32597bd30d117245bb197e5144a0f2140527752eb30554f81991e4981f1de
                              • Instruction ID: 3b4c0a7595bb9208f7173e7f39ba30ad4a2caa5192e2c5ed8cd96c5164a13815
                              • Opcode Fuzzy Hash: f6b32597bd30d117245bb197e5144a0f2140527752eb30554f81991e4981f1de
                              • Instruction Fuzzy Hash: 4DA1136331A3C88BC756CB6C594038E7FA1F36AB84F59C55DEA8187782CA38D61AC351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c3c9a795ffff8cc46327ad08c5d7d29456e77d52ad8eb9aa789ac028d8139280
                              • Instruction ID: c8d6b97177aa04becb7fdddf7cb4b34a8497c9bd295252fccc66f01f11646ebb
                              • Opcode Fuzzy Hash: c3c9a795ffff8cc46327ad08c5d7d29456e77d52ad8eb9aa789ac028d8139280
                              • Instruction Fuzzy Hash: ABB119B27100618BEB298B29F461FBA7791F7D874DFC5510A9B8327E85CA3CB814DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f56900f1e968381e6b723a899dcfc7d6a13bae0d07c83be87544b2206ee54f36
                              • Instruction ID: f842dc6d09abecbee6a357c34d486999acb21f791724cee829b0a173a507966b
                              • Opcode Fuzzy Hash: f56900f1e968381e6b723a899dcfc7d6a13bae0d07c83be87544b2206ee54f36
                              • Instruction Fuzzy Hash: 9DB119B27100618BEB298729F461FBA7791F7D834EFC5510A9B8327E85CA3CB814DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d0bb594c666fb6c82b56590c01db519c8d08be540055e05532e9626c5d9920a4
                              • Instruction ID: 96cd1bfae634da8d12dbe7bf4fd2a53c666ea0c5fd3ddcdef6ff582b1f247548
                              • Opcode Fuzzy Hash: d0bb594c666fb6c82b56590c01db519c8d08be540055e05532e9626c5d9920a4
                              • Instruction Fuzzy Hash: 7191162330B3D88AD757CBAC444079E7F65E769B84F5AC259DE8587382C938CA0BC391
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5cf7a9d8b2a4f956337acb34c8c296d11012329c59907389f414f6099eeab42c
                              • Instruction ID: f0de323cb3fafd9ef2e2b4d6976eea93ad3fe9a64286a8bf8622bc400cd7e588
                              • Opcode Fuzzy Hash: 5cf7a9d8b2a4f956337acb34c8c296d11012329c59907389f414f6099eeab42c
                              • Instruction Fuzzy Hash: 6991042331A3C88BD746CFAC594039E7F61E36AB84F59C159DA8097793CA34D61BC391
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cefa16c948b1ab4730909c219c4e5089701c2f6f42704e033e1ded241bdcd9a0
                              • Instruction ID: 5a504d8110c90d35fa15e79adf7d326c18a4d6adb2a9632fbb64a19fa21f6491
                              • Opcode Fuzzy Hash: cefa16c948b1ab4730909c219c4e5089701c2f6f42704e033e1ded241bdcd9a0
                              • Instruction Fuzzy Hash: 2E7117233192E88BD32ACB2C5444BAE7F54E366780F49C26DDFC587746CA28CA09C351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b5ae4d33ae77e124fe05f288f195b21e2aab3681a5c93213970b552b4689b663
                              • Instruction ID: 1fa1682e5781ca040fb9e4a7e7fd38a7e7aa4ae22f3bbc0c063508b9579a9c72
                              • Opcode Fuzzy Hash: b5ae4d33ae77e124fe05f288f195b21e2aab3681a5c93213970b552b4689b663
                              • Instruction Fuzzy Hash: C3618D732052C88BD726CF6CA44035EBBA0F36AB88F58C159DB8587756CA38E91AC751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c6bc7791e1504b5de156279efae98b42225f4ac07d224114c19cac82c8f6283f
                              • Instruction ID: d9d7bdf3290344eeaa63e1a6965bb77e61c99ba5dbd88a0f7259a80976328950
                              • Opcode Fuzzy Hash: c6bc7791e1504b5de156279efae98b42225f4ac07d224114c19cac82c8f6283f
                              • Instruction Fuzzy Hash: 27514932600A48CAEB8ADF21D5517AC73A5F389BC0F24C526EB4E67785CF31C266C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0551456e63e6e661a69eda5df98884eb2deccc585f14b8e4a0765c220eeca5be
                              • Instruction ID: b4d89c6bc739a6625bf6ce210334f6ef44b6c1b229f3691f508dd590b9327473
                              • Opcode Fuzzy Hash: 0551456e63e6e661a69eda5df98884eb2deccc585f14b8e4a0765c220eeca5be
                              • Instruction Fuzzy Hash: 20514733305AC88BDB56CF2DD84039E7B61E3AABD0F49C159DB9A87792DA24D50AC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 74c4cb5d0d40674ea1dd8f6b77da230bf83b51cd2fe6794a76e4a89e8a22a7a7
                              • Instruction ID: 56d35ef465aeab04bed1e0c673fce5dec7cc8e0109b19855b008ce9e1ce25d4f
                              • Opcode Fuzzy Hash: 74c4cb5d0d40674ea1dd8f6b77da230bf83b51cd2fe6794a76e4a89e8a22a7a7
                              • Instruction Fuzzy Hash: 2151013760064882F7AA8F68C1483BCA7A2E349B68F558304CF49173D8CFE9CE59C780
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7c32812ee8966df7d1d1384a556c007bbb572470a7d3a22053908905fb586e68
                              • Instruction ID: ee9f852c097d2fcc685e67a57fb4d3d54ada755df01214fba3ede28ac1609251
                              • Opcode Fuzzy Hash: 7c32812ee8966df7d1d1384a556c007bbb572470a7d3a22053908905fb586e68
                              • Instruction Fuzzy Hash: 9C5182232193C89FC306CF5C954038D7FA0F36A744F48866DDB9597B92CA38E56AC751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9045f3b26894576d61088d1619e8518051c951db8f386551f825922cc39794af
                              • Instruction ID: 57afafa62139ce15cc45a2c0a87f04340f3dc7f987b5b77315fc761c4109f8c2
                              • Opcode Fuzzy Hash: 9045f3b26894576d61088d1619e8518051c951db8f386551f825922cc39794af
                              • Instruction Fuzzy Hash: 6651E03760465882E7AA8F68C0583ACA7B2E349B68F158304DE451B7D8CFE1DE89C780
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2c9c268c3b241972250ece1e571e85bc233d5d83cb02bf08170c98e137f07fc2
                              • Instruction ID: 419bbc8019598dac1632a8d64a85cb7b3c674dfa4410ff20840d525577d39c27
                              • Opcode Fuzzy Hash: 2c9c268c3b241972250ece1e571e85bc233d5d83cb02bf08170c98e137f07fc2
                              • Instruction Fuzzy Hash: C151D577600A5882E7AA8F68C1583ACB7A2E359F58F168305DF061B7D8CFE1CD45C780
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 655e9c0c703ebf6b16e37822a6e87c8de60c6ad2afa1b71e393945c4a8bfb6af
                              • Instruction ID: 8c275894ed04051122970ba4788b0e0c145f2dabdb11b916e3ba34bb771f00a2
                              • Opcode Fuzzy Hash: 655e9c0c703ebf6b16e37822a6e87c8de60c6ad2afa1b71e393945c4a8bfb6af
                              • Instruction Fuzzy Hash: A551D5232093C88BD716CF5D958038DBFA0F365B84F59C629DB9587B92CA38E51BC351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c1eb749f18e00433ae9cfa30d35891820fabb8d52cae72114baae481739216e0
                              • Instruction ID: 3bd69aead185770da9f7101d198a854eee6ec63ad6ee62b91feba0af086f4822
                              • Opcode Fuzzy Hash: c1eb749f18e00433ae9cfa30d35891820fabb8d52cae72114baae481739216e0
                              • Instruction Fuzzy Hash: DC41B6132197D88ED302CF5D5808B9D7F68E376B94F8A8299DF8597747CA34C609C3A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f88193fffd0d89d9c516691d820b665d22c63be5df261a46c4c1e0b03b5c2bb3
                              • Instruction ID: 44a6f57969e189e860b254bbc33192bf21f8edc23a17bf8a92916eea8c6d9e82
                              • Opcode Fuzzy Hash: f88193fffd0d89d9c516691d820b665d22c63be5df261a46c4c1e0b03b5c2bb3
                              • Instruction Fuzzy Hash: 1D41A7232193D88AD306CF5D5804A8E7F68E376B54F8AC199DF8497743C634C649C3A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b54d0a560e82fa2ce900294f73c263cd33863ded6fad70219ff4453173f0ad8e
                              • Instruction ID: d1d7dc10aa628dc2d3deaea8f4bd4ade27186f45365b539a38f20dcb0d40dbd9
                              • Opcode Fuzzy Hash: b54d0a560e82fa2ce900294f73c263cd33863ded6fad70219ff4453173f0ad8e
                              • Instruction Fuzzy Hash: 024171332193C88AD3068A6C585895E3F28D366340B8A829DEBC4D7743E536C619C7E5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c0d349bfccf04567108c1f90e714519d19e349e7f09ce2b95f50a09e5655793f
                              • Instruction ID: 91986e66ab341a7ed997bcc342dca55875aed30527f30589002cecf46c41b256
                              • Opcode Fuzzy Hash: c0d349bfccf04567108c1f90e714519d19e349e7f09ce2b95f50a09e5655793f
                              • Instruction Fuzzy Hash: 4241C2232193C89AD306CF9C954038EBFA0F366B54F59C629DB9197B92CA38D61BC351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 036a3064e14ed08f9c6848db83d1a247dc96667b1d4a4d584533a7342ebbf511
                              • Instruction ID: 643129ae3ab24142afbaa9f1ccc6f20fea8c2026ffdc491b72e980dded54ea26
                              • Opcode Fuzzy Hash: 036a3064e14ed08f9c6848db83d1a247dc96667b1d4a4d584533a7342ebbf511
                              • Instruction Fuzzy Hash: 6D316F332193CCCAD3068B5D585898E7F28D366341B8A819DEBC487747E536CA19C7E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f45f7b6deb4f7a9a0a48ac491baacd34d4beda24f96ad2bf00d1c8a295fa8586
                              • Instruction ID: d27a97fd0e8c3ad1c55433b68687aa36f5a34b26dc6686ebd583529c09961b1e
                              • Opcode Fuzzy Hash: f45f7b6deb4f7a9a0a48ac491baacd34d4beda24f96ad2bf00d1c8a295fa8586
                              • Instruction Fuzzy Hash: 2C3172332193CCCED302CB5D584898E7F64D36A341B8A819DDAC497747E935C619C7E5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fe6d48acf25183754f262e6e508bb9fed02ecf70cab6f44a180b447611eabd5a
                              • Instruction ID: d6d481939fc481ab478d78aa68d7b9c2cae5f64aed55a68d47f4f39056cb7688
                              • Opcode Fuzzy Hash: fe6d48acf25183754f262e6e508bb9fed02ecf70cab6f44a180b447611eabd5a
                              • Instruction Fuzzy Hash: 6E3181332193CCCAD3028B5D585898E7F28D366341F8A81ADE7C087747E976CA19C7E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2424c5eb9507dd92b72fa6f4d21f0c1c551f1776ceba17abea8fd3eef51c787c
                              • Instruction ID: 7155b28acd7eaf248143e551f18f8b1e5448e8bb6543337eb098fd19be59fc9c
                              • Opcode Fuzzy Hash: 2424c5eb9507dd92b72fa6f4d21f0c1c551f1776ceba17abea8fd3eef51c787c
                              • Instruction Fuzzy Hash: C42141232197C88AD706CF6D584018EBF60F3A6F94B8CC559EB849B74BCA38D51AC771
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 152 18001d300-18001d326 153 18001d672-18001d68b call 180227e50 152->153 154 18001d32c-18001d355 152->154 155 18001d360-18001d397 call 18002b690 154->155 160 18001d399 155->160 161 18001d40e-18001d414 155->161 162 18001d402-18001d409 160->162 163 18001d39b-18001d39e 160->163 164 18001d416-18001d41c 161->164 165 18001d488 161->165 168 18001d48f-18001d4af call 18002b690 162->168 166 18001d442-18001d469 call 18002b690 163->166 167 18001d3a4-18001d3b5 163->167 169 18001d41e-18001d424 164->169 170 18001d47f-18001d486 164->170 165->168 176 18001d4b4-18001d4bd 166->176 179 18001d46b 166->179 167->162 168->176 173 18001d476-18001d47d 169->173 174 18001d426-18001d42c 169->174 170->168 173->168 177 18001d42e-18001d43f 174->177 178 18001d46d-18001d474 174->178 180 18001d520-18001d526 176->180 181 18001d4bf 176->181 177->166 178->168 179->168 182 18001d592 180->182 183 18001d528-18001d52e 180->183 184 18001d4c1-18001d4c5 181->184 185 18001d517-18001d51e 181->185 186 18001d599-18001d5bc call 18002b690 182->186 187 18001d589-18001d590 183->187 188 18001d530-18001d536 183->188 189 18001d4c7-18001d4ca 184->189 190 18001d50b-18001d512 184->190 185->186 196 18001d5c1-18001d5c6 186->196 187->186 192 18001d538-18001d53e 188->192 193 18001d580-18001d587 188->193 194 18001d4cc-18001d4cf 189->194 195 18001d4ff-18001d506 189->195 190->186 197 18001d577-18001d57e 192->197 198 18001d540-18001d546 192->198 193->186 199 18001d4d1-18001d4d4 194->199 200 18001d4f3-18001d4fa 194->200 195->186 201 18001d5c8 196->201 202 18001d63f-18001d644 196->202 197->186 203 18001d548-18001d56c call 18002b690 198->203 204 18001d56e-18001d575 198->204 205 18001d4d6-18001d4d9 199->205 206 18001d4e7-18001d4ee 199->206 200->186 208 18001d5d0-18001d63d CertGetNameStringA call 18002b690 201->208 202->155 209 18001d64a-18001d66a 202->209 203->196 204->186 205->203 207 18001d4db-18001d4e2 205->207 206->186 207->186 208->202 209->153
                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • CertGetNameStringA.CRYPT32 ref: 000000018001D5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCurrentEnterLeaveNameStringThread
                              • String ID: ..\src\ssl\ssl_ctx.c$A CTL used to create this chain did not have a valid signature.$A CTL used to create this chain is not valid for this usage.$A CTL used to create this chain was not time-valid.$A key match issuer certificate has been found for this certificate.$A name match issuer certificate has been found for this certificate.$A valid name constraints for all namespaces, including UPN.$An exact match issuer certificate has been found for this certificate.$An issuance chain policy exists. $No information status reported.$One of the certificates in the chain was issued by a certification authority that the original certificate had certified.$The certificate chain created is a complex chain.$The certificate chain is not complete.$The certificate or chain has a preferred issuer.$The revocation status of the certificate or one of the certificates in the certificate chain is unknown.$This certificate is peer trusted. This status code applies to certificates only.$This certificate is self-signed.$This certificate's certificate revocation list (CRL) validity has been extended.$[%s:%d] %s: TrustStatus: %s$[%s:%d] %s: [%d,%d] subject %s$[%s:%d] %s: trust status info for %d simple chain$[%s:%d][ERR] %s: TrustStatus, unknown error status %08x$[%s:%d][ERR] %s: TrustStatus, unknown info status : %08x$[%s:%d][ERR] %s: TrustStatus: %s$__dump_chain$dump_trust_status
                              • API String ID: 2895763960-3520351524
                              • Opcode ID: f2eae5b4fe7d755545b04a42f73ab6b2b711857b2a6f1880dcac838db4d4f715
                              • Instruction ID: e6d4d31315e50e4e89499cde7ee9f8dd18ea2e92c4aa0d8288d592e0d963ed60
                              • Opcode Fuzzy Hash: f2eae5b4fe7d755545b04a42f73ab6b2b711857b2a6f1880dcac838db4d4f715
                              • Instruction Fuzzy Hash: 02911772205E4C96EBE68B14E4983E97366F34C388F948127F68A03AA4DF79C74DC704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 623 1800251a0-18002521f 624 180025221-180025228 623->624 625 18002522a-18002523b 623->625 626 18002523f-180025298 call 18002b690 624->626 625->626 629 180025524-180025555 626->629 630 18002529e-1800252a1 626->630 632 180025641-180025667 call 180227e50 629->632 633 18002555b-18002555e 629->633 630->629 631 1800252a7-1800252b7 call 180237d1c 630->631 641 1800252b9-1800252bb 631->641 642 1800252bd 631->642 636 180025563-180025566 633->636 639 180025587-1800255ea call 18000d170 636->639 640 180025568-180025584 636->640 648 180025625-18002563b 639->648 649 1800255ec-1800255ff 639->649 640->639 641->642 644 1800252c0-1800252f0 641->644 642->644 646 1800252f2-1800252f9 644->646 647 180025348-18002536b call 18002b690 644->647 651 1800252fb-1800252fe 646->651 652 180025300-180025304 646->652 653 180025370-180025378 647->653 648->632 648->636 649->648 658 180025601-180025620 call 18022c440 649->658 654 180025319-180025346 call 18002b690 651->654 655 180025306-180025309 652->655 656 18002530b-180025315 652->656 659 1800253f6-180025400 653->659 660 18002537a-1800253f4 call 18004cb80 htons call 18002b690 653->660 654->653 655->654 656->654 658->648 664 180025402-18002540c 659->664 665 180025410-180025441 call 18002b690 659->665 670 180025446-180025450 660->670 664->665 665->670 672 180025456-1800254d9 call 18004cb80 htons call 18002b690 670->672 673 1800254db-1800254de 670->673 672->629 674 1800254e0-1800254ea 673->674 675 1800254ee-18002551f call 18002b690 673->675 674->675 675->629
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons
                              • String ID: \ ipv6$..\src\runtime_settings.c$< ipv4$AF_INET$AF_INET6$AF_UNSPEC$IPv4$IPv6$[%s:%d] %s: / Primary address: %s$[%s:%d] %s: / Primary address: none$[%s:%d] %s: %s: address = %s, port = %u$[%s:%d] %s: %s: address = %s, scope = %u, port = %u$[%s:%d] %s: %s: address family = %d (%s)$[%s:%d] %s: result = %d, type = %d (%s), count = %d | ttl = %d | addr_info = %p$other$store_ip_cb4
                              • API String ID: 4207154920-1733452965
                              • Opcode ID: ce0b02dbca2d15f9c50501f14b8c5dd8cb7ca68603cf93cf9601f7c5bcd22f3d
                              • Instruction ID: cee3229742a90a2e067ebf22ff192a0c8e34efccfb6ff124283e202110e63544
                              • Opcode Fuzzy Hash: ce0b02dbca2d15f9c50501f14b8c5dd8cb7ca68603cf93cf9601f7c5bcd22f3d
                              • Instruction Fuzzy Hash: 15E18E72614B8886E7A2CF24E4443E977B5F35C788F409216FE8E53665EF78D298C704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons
                              • String ID: \ ipv6$..\src\runtime_settings.c$< ipv4$AF_INET$AF_INET6$AF_UNSPEC$IPv4$IPv6$[%s:%d] %s: / Primary address: %s$[%s:%d] %s: / Primary address: none$[%s:%d] %s: %s: address = %s, port = %u$[%s:%d] %s: %s: address = %s, scope = %u, port = %u$[%s:%d] %s: %s: address family = %d (%s)$[%s:%d] %s: result = %d, type = %d (%s), count = %d | ttl = %d | addr_info = %p$other$store_ip_cb6
                              • API String ID: 4207154920-2304509321
                              • Opcode ID: c02dbfde879d7e1c10602095f38e3e7b9749381c394583007656d70b7afc84ed
                              • Instruction ID: b30f8b7513cb1f606db67ae45d8faa247448438f7d173b57704e5e1433d7628e
                              • Opcode Fuzzy Hash: c02dbfde879d7e1c10602095f38e3e7b9749381c394583007656d70b7afc84ed
                              • Instruction Fuzzy Hash: 8CD1A032A14B8886E7A2CF24E4453EA77B5F75C788F409216FE8D53665EF78D298C304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InitializeCriticalSection.KERNEL32 ref: 0000000180005704
                              • CreateEventA.KERNEL32 ref: 0000000180005714
                                • Part of subcall function 0000000180009200: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180023F31,?,?,?,?,?,000000018001987D), ref: 0000000180009221
                                • Part of subcall function 0000000180009200: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180023F31,?,?,?,?,?,000000018001987D), ref: 0000000180009234
                              • EnterCriticalSection.KERNEL32 ref: 000000018000578E
                              • timeGetTime.WINMM ref: 000000018000579D
                              • LeaveCriticalSection.KERNEL32 ref: 00000001800058EF
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CreateCurrentEventInitializeThreadTimetime
                              • String ID: ..\src\bootstrap.c$ApplicationInit$NetworkRenewal$RequestError$SettingsChanged$TimerExpired$[%s:%d] %s: final reason %s ( %x )$[%s:%d] %s: use static servers from this list: %s$[%s:%d][ERR] %s: bdnc_event_base_new failed$[%s:%d][ERR] %s: no resolver for bootstrap$[%s:%d][ERR] %s: resolve_proxy_name returned %d %s$[%s:%d][WARN] %s: WARNING: dns_client_init failed$event_context_init
                              • API String ID: 1613208664-822066791
                              • Opcode ID: dd80157b75808917f73cbe13f1ae6920df67fdedc0e7ce6a3e3d66b79246c3c7
                              • Instruction ID: c55bc870b91b4be3ed3069f22d5bdeacbf42ecbfd78c972b0c91f3b5ad82a32a
                              • Opcode Fuzzy Hash: dd80157b75808917f73cbe13f1ae6920df67fdedc0e7ce6a3e3d66b79246c3c7
                              • Instruction Fuzzy Hash: 50A16831200B489AE7E6DF24E8453DA33A6F74C794F44C22AE98A936A5DF78C759C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$Value$CurrentEventSleepThread
                              • String ID: ..\src\global_state.c$[%s:%d] %s: %s thread exiting$[%s:%d] %s: %s thread started$[%s:%d] %s: WARNING: even_base_loop exited$[%s:%d] %s: tls_set( %x, %p )$network$run_base_loop$timers
                              • API String ID: 1464362966-2592715731
                              • Opcode ID: 96435f2355397fa81c2ff12ecc4c051a692bf1b3370342a852d81864249950f9
                              • Instruction ID: 5a97c332abc99f616807e15becdc49f430c8295717396d8dc64f276902d27095
                              • Opcode Fuzzy Hash: 96435f2355397fa81c2ff12ecc4c051a692bf1b3370342a852d81864249950f9
                              • Instruction Fuzzy Hash: F4510D34210A488AEBD29F10F8983C973A6F78C794F448116E94AA76A4CFBDC74DC748
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004A91
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004AD9
                              • timeGetTime.WINMM(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004AF3
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004B82
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004BB1
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004BD2
                              • WaitForSingleObject.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004BEA
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004BF7
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000001800017C1), ref: 0000000180004C04
                              • CreateThread.KERNEL32 ref: 0000000180004C2C
                              • LeaveCriticalSection.KERNEL32 ref: 0000000180004CEA
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$Thread$CloseCreateCurrentHandleObjectSingleTimeWaittime
                              • String ID: ..\src\bootstrap.c$[%s:%d] %s: a new bootstrap was postponed %d$[%s:%d] %s: skip bootstrap / null settings$[%s:%d] %s: suspended$start_bootstrap
                              • API String ID: 1241518772-161193796
                              • Opcode ID: 00cbf1adfa6522d2b35eacbb47980d60363a15a33b57f0d204a372415dcd0c4e
                              • Instruction ID: 7801855e8c00e359598b1d6a03679f213743a4ddb1832ab6c4ce20ca3143e73b
                              • Opcode Fuzzy Hash: 00cbf1adfa6522d2b35eacbb47980d60363a15a33b57f0d204a372415dcd0c4e
                              • Instruction Fuzzy Hash: FB712676204A488AF7E2CF50F8957D973A5F78C390F418126ED4A866A0DF69CB4CC748
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$ErrorLast$CurrentEnterInitializeLeaveStartupThreadsocket
                              • String ID: $..\src\win\net_awareness.c$[%s:%d] %s: event set for %x ( FD_CLOSE %x, FD_READ %x, FD_WRITE %x, FD_ADDRESS_LIST_CHANGE %x, FD_ROUTING_INTERFACE_CHANGE %x )$[%s:%d][ERR] %s: WSACreateEvent: %d ( %s )$[%s:%d][ERR] %s: WSAEventSelect: %d ( %s )$[%s:%d][ERR] %s: WSAStartup : %d ( %s )$[%s:%d][ERR] %s: socket error %d ( %s )$network_awareness_init
                              • API String ID: 2392668120-1197466459
                              • Opcode ID: 119964fdaa7e3fa3be35079194eca87a9674af8b075fc2aef1f6cf8f67251ff2
                              • Instruction ID: af957c82111db8064bb51ab8a36141ce93cbc7400eed6d42bd02aea594757f9f
                              • Opcode Fuzzy Hash: 119964fdaa7e3fa3be35079194eca87a9674af8b075fc2aef1f6cf8f67251ff2
                              • Instruction Fuzzy Hash: E8514D30600B4886FBE29F64E4593DA73A6F74C394F408226B55A877E5EFBDC64C8744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: File$CloseErrorHandleLast$CreateCriticalSectionView$CurrentEnterLeaveMappingSizeThreadUnmap
                              • String ID: ..\src\win\file_map.c$[%s:%d][ERR] %s: cannot map file '%S', retcode %d$file_map_create
                              • API String ID: 443895369-2830061828
                              • Opcode ID: f4fab0987886befb8816391a9b32f8ec240fe3da210ee4bab075a4179f14fb9d
                              • Instruction ID: b940511d9f2d3bd06b8c53d70090f835ebf09b701ef15f07a21dd95abdf27a9e
                              • Opcode Fuzzy Hash: f4fab0987886befb8816391a9b32f8ec240fe3da210ee4bab075a4179f14fb9d
                              • Instruction Fuzzy Hash: D2816D36204B4882EBA68B24E8587DE73A1F78D794F408216EE5747BA4DF7DCA4DC704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons
                              • String ID: \ ipv6$..\src\bootstrap_proxy.c$< ipv4$AF_INET$AF_INET6$AF_UNSPEC$[%s:%d] %s: / Primary address: %s$[%s:%d] %s: / Primary address: none$[%s:%d] %s: %s: address = %s, port = %u$[%s:%d] %s: %s: address = %s, scope = %u, port = %u$[%s:%d] %s: %s: address family = %d (%s)$[%s:%d] %s: name = %s, rc = %d$other$resolve_proxy_name
                              • API String ID: 4207154920-2387825641
                              • Opcode ID: 0a740507b00c8fcd1c9b0e5dd580b7c6f67d37f748998d40ba28631955a50ca5
                              • Instruction ID: 6074670467a04f40f85ed3d6b192f0ba218d174b8844367a24d49e407c03a00e
                              • Opcode Fuzzy Hash: 0a740507b00c8fcd1c9b0e5dd580b7c6f67d37f748998d40ba28631955a50ca5
                              • Instruction Fuzzy Hash: E0815D72608B88D5E7E2CB10E4453EAB3A5F358794F409216FA8E53665EF7DC29CC740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ObjectSingleWait$CloseCreateCurrentEventHandleThread
                              • String ID: ..\src\api.c$@$[%s:%d] %s: wait for %d uploads$bdnimbus_uninit
                              • API String ID: 1381872527-2092499606
                              • Opcode ID: 1a1ca4426385fb097f09188794586504926892a42b6176f22a100e036b662ee5
                              • Instruction ID: ff04b055ded518ba045d970247867776e4573509aa3b8c0228ffe5078b061720
                              • Opcode Fuzzy Hash: 1a1ca4426385fb097f09188794586504926892a42b6176f22a100e036b662ee5
                              • Instruction Fuzzy Hash: D0416136224A48CAE7C1DF20E8587D973A1F789795F448115FA5B426F4DFB8CA4CCB05
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Hash
                              • String ID: %li object item(s) left unpacked: %s$<args>$<format>$<internal>$<unknown>$<validation>$?$Expected '}' after '%c', got '%c'$Expected format 's', got '%c'$Expected object, got %s$NULL object key$Object item not found: %s$Out of memory$Unexpected end of format string
                              • API String ID: 1904921990-3531910078
                              • Opcode ID: 05ee1e3be7e25bb9f4c975a4f49d63943ebbf26417133c7336f3457cf4f5f366
                              • Instruction ID: aac3dcc0e64a85f60f118cafecc2e4279924eb8038b10cd5f3100a949d243600
                              • Opcode Fuzzy Hash: 05ee1e3be7e25bb9f4c975a4f49d63943ebbf26417133c7336f3457cf4f5f366
                              • Instruction Fuzzy Hash: 40A1C632200E4C55FAD39B16A4C03EA6391B74DBE8F569212FD6A4B3D6DE78C74D8348
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: ..\src\user_context.c$[%s:%d] %s: [%p] local rt setts host: %s, port: %hd$[%s:%d] %s: [%p] local rt setts host: %s, proxy: %s ( %X:%hd )$[%s:%d] %s: [%p] local rt setts host: %s, proxy: %s ( [%X]:%hd )$[%s:%d] %s: [%p] local rt setts host: %s, proxy: %s unknown address family (%u)$set_local_cloud
                              • API String ID: 0-1885314491
                              • Opcode ID: f3ca5b164149379d52183903cf9d72181a51eceb819a41ff5944b2f860da48ce
                              • Instruction ID: 4e4c4f695aa5cb01441d69daa9868e710223c9e570e77c7aa095e74c31e2acab
                              • Opcode Fuzzy Hash: f3ca5b164149379d52183903cf9d72181a51eceb819a41ff5944b2f860da48ce
                              • Instruction Fuzzy Hash: 7CB19D32208F4886E7D68F11E4843E973A5F74DB84F508112FA9A53BA4EF79C75AC740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Timetime
                              • String ID: ..\src\conn_pool.c$[%s:%d] %s: benchmark_threshold reached, sending test request: %d$[%s:%d][WARN] %s: benchmark_threshold reached in less then 60s, ignore for now!$_ServerStatus$verify_request
                              • API String ID: 17336451-1321870699
                              • Opcode ID: c70fa1663e0e7013da89e1d5bebb1d3788274e66c317e6f83b24b0f1fd45e71d
                              • Instruction ID: c1e759012fd030fefee916f2192a9184179e6e64bccc9e399d3542b0f09327dc
                              • Opcode Fuzzy Hash: c70fa1663e0e7013da89e1d5bebb1d3788274e66c317e6f83b24b0f1fd45e71d
                              • Instruction Fuzzy Hash: AA817136604B4887E796DF24E8443D973A5F78CB88F448125EE4D83765EFB8C699C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007D29
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007D3C
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007D5A
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007D77
                              • WaitForSingleObject.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007D89
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007D96
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007DAB
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007E0B
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007E2A
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007E5C
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 0000000180007E8A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ObjectSingleWait
                              • String ID: /services/genid$order_benchmark$uuid
                              • API String ID: 1755037574-1048225497
                              • Opcode ID: be0883f20efd0d76a0a2a6a841d43ee9a55cfcc821b3e40db18a96e0385b213a
                              • Instruction ID: 1e8baf09eb00181db9e948ab87d1ee444fbeb9943cc6251d5ddc077036d1fa89
                              • Opcode Fuzzy Hash: be0883f20efd0d76a0a2a6a841d43ee9a55cfcc821b3e40db18a96e0385b213a
                              • Instruction Fuzzy Hash: ED614B36610B4889EB92DF21E8943E833A5F79CB99F558212ED1E437A5DF78C68DC340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$Events$Count64CurrentEnumMultipleNetworkThreadTickWait
                              • String ID: $..\src\win\net_awareness.c$[%s:%d] %s: exiting...$[%s:%d] %s: handling events %x $[%s:%d] %s: waiting_time %d, do_bootstrap: %d$network_awareness_wait
                              • API String ID: 4207378580-2594836476
                              • Opcode ID: 1f3ecd9d34664e200a46fcc124ad29c37d9d19c830f760999c733b4f300481ae
                              • Instruction ID: 4ea8b29b0890a62dbe9c8e43208bc0b59dfaefe954f133a29bc1417d23952952
                              • Opcode Fuzzy Hash: 1f3ecd9d34664e200a46fcc124ad29c37d9d19c830f760999c733b4f300481ae
                              • Instruction Fuzzy Hash: 38517D36200B4882F7A29F11F8487DA7361F78C795F508215EE9A476E5EF79CA0DC748
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: FormatMessage
                              • String ID: No error$Request canceled$address family for nodename not supported$ai_family not supported$ai_socktype not supported$invalid value for ai_flags$memory allocation failure$no address associated with nodename$nodename nor servname provided, or not known$non-recoverable failure in name resolution$servname not supported for ai_socktype$system error$temporary failure in name resolution
                              • API String ID: 1306739567-2106543238
                              • Opcode ID: 69610d5da211b9e43433429a0ae27d88b74ee0a34548894950df51f15ef0d3a8
                              • Instruction ID: be3758e770fb9b962f2b4101a5bd4e6f6ed3bfe85ad210926c0cba20e98dd418
                              • Opcode Fuzzy Hash: 69610d5da211b9e43433429a0ae27d88b74ee0a34548894950df51f15ef0d3a8
                              • Instruction Fuzzy Hash: F83162B5E00A4D9DEED68718ECC93D42251BB893D8FC9819BE61C417B5CE6C876D8708
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons$htonl$getprotobynumbergetservbynameif_nametoindex
                              • String ID: %u.%u.%u.%u%c$tcp$udp
                              • API String ID: 2145373577-1920569115
                              • Opcode ID: d639a59a576ee61bfcd3776ccb1a1d88b6018731c85ac12b0696f59186759f2f
                              • Instruction ID: 0177892e018723988df61707d9891f823e3bf2eaf677c633446db0dae9630c52
                              • Opcode Fuzzy Hash: d639a59a576ee61bfcd3776ccb1a1d88b6018731c85ac12b0696f59186759f2f
                              • Instruction Fuzzy Hash: DD326D32B00B888AFB96CF65C4843ED33A1F75978CF05C529EE4957A85EF349698C744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: File$CreateErrorLast$CloseHandleMutexReadSize
                              • String ID: ..\src\win\wslib_proxy.c$[%s:%d] %s: %s$[%s:%d] %s: '%S' size %u $[%s:%d] %s: failed %d %s$get_wslib_proxy_settings$read_proxy_settings_file
                              • API String ID: 764440035-3347728553
                              • Opcode ID: 9a9bac08991f274b7a23e2cda621e445181768074cf343ae3868277f66c27741
                              • Instruction ID: 1f28283fa611dcfe7942fd8c26238b29b560e8adcb0d69f223728fe7e61b72dd
                              • Opcode Fuzzy Hash: 9a9bac08991f274b7a23e2cda621e445181768074cf343ae3868277f66c27741
                              • Instruction Fuzzy Hash: F5D1CD36304B8886EBA29F25A4453DAB7A1F788BD4F54C125FE8A43795DF78C60DCB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID: ..\src\dns_client.c$DNS_ERR_0x????????$IPv4$IPv6$[%s:%d] %s: [resolving %s] result = %d, type = %s, count = %d, restarted = %d$[%s:%d] %s: [resolving %s] result = %s$[%s:%d] %s: delta = %d for %s$[%s:%d] %s: resending ipv4 request for %s$[%s:%d] %s: resending ipv6 request for %s$dns_client_cb$dns_client_resend_req$other
                              • API String ID: 0-3739046466
                              • Opcode ID: 32a46044ef1a3408bdd975d5a75769f5444cbb9f17bdfa7217605a12f38ebfb9
                              • Instruction ID: fc53509108d1d43912d9ba45907ae5a1d0392aad465786dc0c2a93443c90fc5d
                              • Opcode Fuzzy Hash: 32a46044ef1a3408bdd975d5a75769f5444cbb9f17bdfa7217605a12f38ebfb9
                              • Instruction Fuzzy Hash: 8D917F72205B4986EBE6CF15E4803D973A5F38CB88F548126EA8E87798DF78C659C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCertificateContextCreateCurrentEnterErrorLastLeaveThread
                              • String ID: ..\src\ssl\ssl_ctx.c$[%s:%d] %s: ChainContext->TrustStatus.dwErrorStatus %x$[%s:%d][ERR] %s: CertCreateCertificateContext failed %d$[%s:%d][ERR] %s: CertGetCertificateChain failed and returned 0x%x$[%s:%d][ERR] %s: i2d_X509 failed!$verify_by_wincrypt$x509_to_cert_context
                              • API String ID: 2957535492-3419966419
                              • Opcode ID: 42f587d87058c165350c04bb0e66ed8e0915ac6bb1692d0a6f72c3ddf143d1ed
                              • Instruction ID: d574a7da27866d80d0de8dbaaf123cab5504ce24c08647fd5e8a7f30685c46d4
                              • Opcode Fuzzy Hash: 42f587d87058c165350c04bb0e66ed8e0915ac6bb1692d0a6f72c3ddf143d1ed
                              • Instruction Fuzzy Hash: BD715E32605B4885FB92DF64E8457D933A1E78D788F408126BE4D17AA5EF79C78DC308
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CloseCreateErrorHandleLastMutexObjectSingleWait
                              • String ID: Global\WSLibDefProxyMutex$ImagePath$SYSTEM\CurrentControlSet\Services\VSSERV$vsserv
                              • API String ID: 1736628457-1302513531
                              • Opcode ID: 53e845cb16d2c7ce4f62b7733daffdc6e911f197ab93294faa4d4e4286a654b3
                              • Instruction ID: 2e82a52f8cc0d8aaf4ad6456095f4e6be0633689a5f537d0375e193946d02534
                              • Opcode Fuzzy Hash: 53e845cb16d2c7ce4f62b7733daffdc6e911f197ab93294faa4d4e4286a654b3
                              • Instruction Fuzzy Hash: 91517135315B8882EBE29B24E4493AA7361FB8D7D4F808215F98A43BA5DF79C64DC704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons$CriticalSection$CurrentEnterLeaveThread
                              • String ID: %hu$..\src\bootstrap_proxy.c$[%s:%d][ERR] %s: INALID proxy string size %u > 255(domain) + 1(:) + 5(port)$[%s:%d][ERR] %s: error converting port %s$[%s:%d][ERR] %s: resolving proxy name failed %d ( %s )$event_context_init$get_proxy_address$get_proxy_port
                              • API String ID: 3061074959-946998157
                              • Opcode ID: 77a81ed041eb999e9ada7486b30f522a9e071ba48bd6e18127870a6ec2549d73
                              • Instruction ID: c7132afbdf041d4dd4573f23aff71851a48c8bfcff6e33a75c723e7ae48333ff
                              • Opcode Fuzzy Hash: 77a81ed041eb999e9ada7486b30f522a9e071ba48bd6e18127870a6ec2549d73
                              • Instruction Fuzzy Hash: 9291BD72B04A8881EBA2CF24E4083DA77A1F759798F44C126EA4D476D6DFBDC68DC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Current$CloseCreateDeleteEventHandleInitializeObjectProcessSingleThreadWait
                              • String ID: ..\src\rpc\rpc_server.c$[%s:%d][ERR] %s: fail __rpc_wrap_upload_callback$__rpc_wrap_upload_callback
                              • API String ID: 2203566803-1804713744
                              • Opcode ID: 7a897d38a4fa222d0008ed8b71da0d66f69940668cbfb48c1b0c575fe22ff300
                              • Instruction ID: 654090693d2f7f81e91e883800d9aaf31b2b54e3ecb5746176d451f464ae137f
                              • Opcode Fuzzy Hash: 7a897d38a4fa222d0008ed8b71da0d66f69940668cbfb48c1b0c575fe22ff300
                              • Instruction Fuzzy Hash: EB612476700A48CAEBA2DF64E4843DD33B5F748B88F418126EE4A57BA8DF34C659C744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Current$CloseCreateDeleteEventHandleInitializeObjectProcessSingleThreadWait
                              • String ID: ..\src\rpc\rpc_server.c$[%s:%d][ERR] %s: fail __rpc_wrap_upload_callback$__rpc_wrap_upload_read_callback
                              • API String ID: 2203566803-743871013
                              • Opcode ID: 4df97d72658ecfdfe64ba9671ecae55087768fbfaac0a1523e7a062799478404
                              • Instruction ID: ea81d83cca56c09f99acbc3d04915c760471e47436f3e7449c4c784ddc32bcad
                              • Opcode Fuzzy Hash: 4df97d72658ecfdfe64ba9671ecae55087768fbfaac0a1523e7a062799478404
                              • Instruction Fuzzy Hash: A6511536700A488AEB92DFA4E4543DD33B5F748B5CF418626AE4E57BA8DE34C61DC380
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: File$DeleteErrorLast$CloseCreateCurrentHandleMoveProcessWrite
                              • String ID: %s.tmp.%d
                              • API String ID: 556425708-2581808395
                              • Opcode ID: af9e7c332613c6ae63707ca3cd97265a0599f4310e301c74c3619c70dfb9b7fc
                              • Instruction ID: 976f2ae6779a7fe713dfaf19095e5d47e0c50095c6cd47f3a8abef3a7cd82836
                              • Opcode Fuzzy Hash: af9e7c332613c6ae63707ca3cd97265a0599f4310e301c74c3619c70dfb9b7fc
                              • Instruction Fuzzy Hash: F6417335204A4882FBD29B25A4043AD63A1FB8EBE0F54C216FD56477E4DF79C64E8705
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterEvent$CloseDeleteHandle
                              • String ID: ..\src\user_context.c$[%s:%d] %s: context %p$user_context_free
                              • API String ID: 3243869176-760787364
                              • Opcode ID: 528c919e662e59c8ac7cecb139da6bb4a28bd3705507a498199fd55ba5a67612
                              • Instruction ID: e40c35f0bea0219aec65af887ea09008c75b8dc8906a105946ee75eac4537473
                              • Opcode Fuzzy Hash: 528c919e662e59c8ac7cecb139da6bb4a28bd3705507a498199fd55ba5a67612
                              • Instruction Fuzzy Hash: E8413D36204E4896EB969F11E9943E87361FB88B80F50C411EF5A436A1CF79D76DC345
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CloseEnterEventLeave$CleanupCurrentDeleteHandleObjectSingleThreadWaitclosesocket
                              • String ID: ..\src\win\net_awareness.c$[%s:%d] %s: closing socket %d for network awareness$network_awareness_uninit
                              • API String ID: 1809356277-1513254717
                              • Opcode ID: cfbdc9b7a89ad74a1593a6fc0c17ca61ad7022e9dfc4d68184e00e9674f948e8
                              • Instruction ID: 7455f4952d7b9762a678319bae2ec7ded4503d79f9d158b74ef4d52b35fb15d3
                              • Opcode Fuzzy Hash: cfbdc9b7a89ad74a1593a6fc0c17ca61ad7022e9dfc4d68184e00e9674f948e8
                              • Instruction Fuzzy Hash: 0D214F35201B0882EBD69F20E8583983365FB4DB69F048711ED6A436F4CF79C69DC345
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(00000000,?,?,?,?,00000000,00000001801222EC,00000001800D9FA7,?,00000001800D9DBE,?,0000000180082FCB,00000000,0000000180083325,?,00000000), ref: 00000001801224C4
                              • GetFileType.KERNEL32(?,?,?,?,00000000,00000001801222EC,00000001800D9FA7,?,00000001800D9DBE,?,0000000180082FCB,00000000,0000000180083325,?,00000000), ref: 00000001801224D5
                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000001801222EC,00000001800D9FA7,?,00000001800D9DBE,?,0000000180082FCB,00000000,0000000180083325,?,00000000), ref: 0000000180122538
                              • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,00000001801222EC,00000001800D9FA7,?,00000001800D9DBE,?,0000000180082FCB,00000000,0000000180083325,?,00000000), ref: 00000001801225A5
                              • RegisterEventSourceW.ADVAPI32 ref: 0000000180122753
                              • ReportEventW.ADVAPI32 ref: 0000000180122795
                              • DeregisterEventSource.ADVAPI32 ref: 000000018012279E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Event$FileSource$ByteCharDeregisterHandleMultiRegisterReportTypeWideWrite
                              • String ID: OpenSSL$OpenSSL: FATAL$no stack?
                              • API String ID: 1270133462-278800372
                              • Opcode ID: a6e30cf66f051693dae68a3b364c796e4b5a290642cf1f023cc859ad0de78500
                              • Instruction ID: 0464d2c47092815e0f1c6173ad4242d1789bc52561a60bc39d23d63a031f175c
                              • Opcode Fuzzy Hash: a6e30cf66f051693dae68a3b364c796e4b5a290642cf1f023cc859ad0de78500
                              • Instruction Fuzzy Hash: 43911373214B8996EBA2CF24D8583ED3765F749BA4F408316EA6907B95EF78C358C300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • htons.WS2_32 ref: 000000018002CB00
                              • htons.WS2_32 ref: 000000018002CB11
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000000,?,000000018002C173,?,?,00000000,000000018002C83F), ref: 000000018002CB95
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000000,?,000000018002C173,?,?,00000000,000000018002C83F), ref: 000000018002CBAE
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSectionhtons$EnterLeave
                              • String ID: ..\src\push_conn.c$[%s:%d] %s: '%s'$[%s:%d] %s: pc = %p, push_id: %s, host: %s, port: %hu$h_id=$prepare_ri$push_connection_alloc$push_connection_free
                              • API String ID: 1465762026-1002155342
                              • Opcode ID: a749c5ee49f4709239b3e20c736d3102acacfe4d0c1982ab3db86f3c62dc06dc
                              • Instruction ID: 641d79cc962f26776d4766ab4eec7ee30122784416767a57afb92a7e53de2e65
                              • Opcode Fuzzy Hash: a749c5ee49f4709239b3e20c736d3102acacfe4d0c1982ab3db86f3c62dc06dc
                              • Instruction Fuzzy Hash: 09B14B32501BC886D796CF20E8507E933B5F758B88F049226EE8D47369EF78C298C354
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalFileSection$CloseCreateCurrentEnterHandleLeavePointerProcess
                              • String ID: ..\src\win\bdnc_log.c$2.7.23.13110 26dabe2$[%s:%d] %s: %s for %s$log_init_file$windows_amd64
                              • API String ID: 202967565-2997241219
                              • Opcode ID: fd2539fee1170c0b6c44980dad3c98a43e8f297e9842d00d6b396c3a5fb21250
                              • Instruction ID: 882ba3c42365f7850e249c491c584aca7eb675dd6f6499a08472139707a4f6cf
                              • Opcode Fuzzy Hash: fd2539fee1170c0b6c44980dad3c98a43e8f297e9842d00d6b396c3a5fb21250
                              • Instruction Fuzzy Hash: 90316935200B4885EBD29B15F8583A963A2B74D7B4F048311EE6A43BE4DFBDC65DC704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalFileSection$CloseCreateCurrentEnterHandleLeavePointerProcess
                              • String ID: ..\src\win\bdnc_log.c$2.7.23.13110 26dabe2$[%s:%d] %s: %s for %s$log_init_file$windows_amd64
                              • API String ID: 202967565-2997241219
                              • Opcode ID: 2ecbfdb8859b5a3bd95fbd26eb6fe18c225c43cc11a6a7f6beea6a4c30b1d08a
                              • Instruction ID: 5e2d66d8e8aca9ee2a19b27973b816b1ec104f0292d825ccf6606160d73b3ce5
                              • Opcode Fuzzy Hash: 2ecbfdb8859b5a3bd95fbd26eb6fe18c225c43cc11a6a7f6beea6a4c30b1d08a
                              • Instruction Fuzzy Hash: 24315535201B4885EBD39B20F8583A923A2BB4D7A4F048311EE6A43BE5DFBDC64DC704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$CloseEnterHandleObjectSingleWait$CurrentThread
                              • String ID: ..\src\api.c$[%s:%d] %s: RPC thread joinded$[%s:%d] %s: Waiting for RPC thread$__bdnimbus_set_optionv
                              • API String ID: 2755589515-973058027
                              • Opcode ID: 4fadbac417943e66058e638232ad83b01b11072ef91ee4fe71ea5bf788792abc
                              • Instruction ID: 99d956d71abee1ef6cd4f2083baff09278aa10ab0e578b34bed3c4bd6b88c4ec
                              • Opcode Fuzzy Hash: 4fadbac417943e66058e638232ad83b01b11072ef91ee4fe71ea5bf788792abc
                              • Instruction Fuzzy Hash: 1F119339200A4886E7D3DB51FC993D87322BB8D7A1F55C212AC1A962F48F79878DC315
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\global_state.c$[%s:%d] %s: new runtime_settings: %p | old: %p$[%s:%d][WARN] %s: new_rt_setts not set!$runtime_settings_reconfiguration$set_runtime_configuration
                              • API String ID: 3168844106-171095035
                              • Opcode ID: bc08d9edf48f212b4b4709a117028e77620c6804061d43fded0dc9ccb7a3570f
                              • Instruction ID: 2f48f0bf0723d063989da4d47baf2ab918e7017de8bcfecdcd3d5279e0e8ffd7
                              • Opcode Fuzzy Hash: bc08d9edf48f212b4b4709a117028e77620c6804061d43fded0dc9ccb7a3570f
                              • Instruction Fuzzy Hash: 30514635205B4985EAD2DB51F8943E9B3A5BB8CBC0F45C422ED5E53BA5EF68C70C8341
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Value$ErrorLast$Heap$AllocateFree
                              • String ID:
                              • API String ID: 3174826731-0
                              • Opcode ID: 5436fd40256895cb00b8b959648f034ffeb9954ba6898a7639f87a1cbf12b989
                              • Instruction ID: 2b1015b2fe9656ef3978541438f1d9c16d0c5384d045200822034322d338a4e2
                              • Opcode Fuzzy Hash: 5436fd40256895cb00b8b959648f034ffeb9954ba6898a7639f87a1cbf12b989
                              • Instruction Fuzzy Hash: 1D417130204A1C42FEDBA73959DD3E913A35F9D7B0F0AC7246C7A46AD3DDE89A498301
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThread
                              • String ID: ..\src\upload\upload_request.c$[%s:%d][ERR] %s: ERROR: cannot upload over http ( BDNIMBUS_ENOSSLUPLOAD )$[%s:%d][ERR] %s: evhttp_uri_get_scheme returned no scheme$[%s:%d][ERR] %s: evhttp_uri_parse error$[%s:%d][ERR] %s: unsupported upload scheme '%s'!!!$http$https$parse_upload_location$upload_request_load_location
                              • API String ID: 2351996187-241596716
                              • Opcode ID: 8079441460dfc8464459651d25028fae7c1d32f95bf65a50c77bea82710f2cdf
                              • Instruction ID: cc8e5094f05d1f1e27fe8fabce802c0643e4d57b20fa4aa0b26cd0ebe8607634
                              • Opcode Fuzzy Hash: 8079441460dfc8464459651d25028fae7c1d32f95bf65a50c77bea82710f2cdf
                              • Instruction Fuzzy Hash: EDA1D631204B8C81FAE6DF25A8803EB7391FB4D7D4F458115BE9A87796DE78C608C305
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                                • Part of subcall function 0000000180035ED0: EnterCriticalSection.KERNEL32(?,?,?,00000001800334E5), ref: 0000000180035EFB
                                • Part of subcall function 0000000180035ED0: LeaveCriticalSection.KERNEL32(?,?,?,00000001800334E5), ref: 0000000180035F5F
                              • EnterCriticalSection.KERNEL32 ref: 000000018003350D
                              • SetEvent.KERNEL32 ref: 000000018003352B
                              • LeaveCriticalSection.KERNEL32 ref: 0000000180033535
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentEventThread
                              • String ID: ..\src\rpc\rpc_server.c$[%s:%d] %s: RPC loop ended$[%s:%d] %s: RPC loop starting %p$[%s:%d] %s: waiting 4 client to start$[%s:%d][ERR] %s: RPC: invalid message size (%d) received$[%s:%d][ERR] %s: {msg_id:%x, api_id:%d, client_id:%p} NOT found$half_duplex_recv_th
                              • API String ID: 1044671773-1970580199
                              • Opcode ID: 8c2da57c64eba52655e1ddaff454360a55f926717f7460f52b42f5034c96fbd9
                              • Instruction ID: 24ee1619065de2eaff0b08eff75d7f11f1a7f5bce561264a1d2ce2690badced4
                              • Opcode Fuzzy Hash: 8c2da57c64eba52655e1ddaff454360a55f926717f7460f52b42f5034c96fbd9
                              • Instruction Fuzzy Hash: FA713A72205B89D6EBA2DF21E4843DA73A5F74CB88F418516EB8E47B64DF38C659C700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: File$CloseCreateErrorHandleLastReadSize
                              • String ID: ..\src\win\wslib_proxy.c$[%s:%d] %s: '%S' size %u $read_proxy_settings_file
                              • API String ID: 3577853679-2197343608
                              • Opcode ID: ee1b067515cf3df9bf7c21b1e771e9be1b3553fde29a0fdc65ed59c47d982b5e
                              • Instruction ID: f825f7d504682b49347d9de6a57a1cf39243cbde83097939fa561fd33ee31ea7
                              • Opcode Fuzzy Hash: ee1b067515cf3df9bf7c21b1e771e9be1b3553fde29a0fdc65ed59c47d982b5e
                              • Instruction Fuzzy Hash: B331B335304A4486E7E29F25A8853DD76A1F78CBD0F108225FE4A837D4DF79C64D8744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterValue$CurrentEventThread
                              • String ID: ..\src\upload\upload.c$[%s:%d] %s: Upload thread started !!!$[%s:%d] %s: Upload thread stopped !!!$[%s:%d] %s: tls_set( %x, %p )$run_base_upload_loop
                              • API String ID: 109659918-3087495567
                              • Opcode ID: 26a30512afc71eed2cdae5c6c1ec1121441c4120e32c3eefbc150fda66eece7d
                              • Instruction ID: 9c826b0a16dc58543024116b3e31329d636cb8b6a5f7aeed879db46551f25062
                              • Opcode Fuzzy Hash: 26a30512afc71eed2cdae5c6c1ec1121441c4120e32c3eefbc150fda66eece7d
                              • Instruction Fuzzy Hash: 77318F35214A4896E3D2DB11F8897D93362F78C794F808115EA8A83BA5CFBCC75EC740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: 2.7.23.13110 26dabe2
                              • API String ID: 3168844106-1144658929
                              • Opcode ID: a5d96aee57a43fa8385db11e393a447b04ed0111086fc0bfdbf9c76a4413c1e6
                              • Instruction ID: dd2827d4fc4ca981009a0feb46e65ef921334ac641c9dc7c726b7ee9a999237a
                              • Opcode Fuzzy Hash: a5d96aee57a43fa8385db11e393a447b04ed0111086fc0bfdbf9c76a4413c1e6
                              • Instruction Fuzzy Hash: B7515E3571464886EBD79B5AF9D83EC6362B78D7C1F858011ED0E877A6DE28CB8C8305
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: 2.7.23.13110 26dabe2
                              • API String ID: 3168844106-1144658929
                              • Opcode ID: b5f2a6aac9a5f95bd2ca3143ba8770d5a3ba73f3d8a8c3d3e80964c90a0832d8
                              • Instruction ID: 926b6632d78d4d6e5feddfab0be0de2bd2ebf384825cad0466e3cc00d0982598
                              • Opcode Fuzzy Hash: b5f2a6aac9a5f95bd2ca3143ba8770d5a3ba73f3d8a8c3d3e80964c90a0832d8
                              • Instruction Fuzzy Hash: 43416A36240648CEF7E6CF64E8987E973A2F79D382F44C411F94686AA4DE38CB4C8701
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • timeGetTime.WINMM(?,?,?,?,?,?,00000000,000000018001C644,?,?,?,?,?,?,000000018001B7B3), ref: 000000018001C203
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThreadTimetime
                              • String ID: ..\src\ssl\ssl_ctx.c$<null>$[%s:%d] %s: SSL_CTX_load_verify_locations( <ctx>, '%s', '%s') = %d$[%s:%d] %s: SSL_CTX_load_verify_locations( <ctx>, '%s', NULL ) = %d$[%s:%d] %s: SSL_CTX_load_verify_locations( <ctx>, NULL, '%s' ) = %d$[%s:%d][ERR] %s: Cannot get X509_STORE handler$load_CryptoApi_certs$ssl_verify_init
                              • API String ID: 3735742524-2469524778
                              • Opcode ID: b61784dd9f628794cdd7a761bc4964dcf1e2c777bb036b3527d21130d8ac50b0
                              • Instruction ID: 65e8701c34c59ec61103a26eac132668d1b223db1f516a26d16f45797026a6d3
                              • Opcode Fuzzy Hash: b61784dd9f628794cdd7a761bc4964dcf1e2c777bb036b3527d21130d8ac50b0
                              • Instruction Fuzzy Hash: 1F517A71204B5886FBE29F61A9457EA6392F78CBC0F448022FD4A57B95DF7CC7098709
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CertCertificatesCriticalEnumSectionStore$CurrentEnterLeaveThread
                              • String ID: ..\src\ssl\ssl_ctx.c$[%s:%d] %s: '%s' %s$[%s:%d] %s: Added %d certificates from a total of %d$[%s:%d][ERR] %s: d2i_X509 error on %p of size %d!!!$hcert_2_x509_store$not added$x509_cert_dump
                              • API String ID: 2440139821-491327956
                              • Opcode ID: d5cbb395237e02620f5676faf9bb2646f103db0e9073b4156a005748b6ce5e9c
                              • Instruction ID: 99436d05f4a99e0147eb94f1b8e7199ddcbc5544fc89d65bedf8dbe8c9934fa4
                              • Opcode Fuzzy Hash: d5cbb395237e02620f5676faf9bb2646f103db0e9073b4156a005748b6ce5e9c
                              • Instruction Fuzzy Hash: FB41AF32205B8881EBA6DB11E8453CAB3A1F78CB84F448026BE8E57B55DF7CC64DC744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,bootstrap,00000000,0000000180006A66), ref: 0000000180007B20
                              • LeaveCriticalSection.KERNEL32(?,?,bootstrap,00000000,0000000180006A66), ref: 0000000180007B37
                              • EnterCriticalSection.KERNEL32(?,?,bootstrap,00000000,0000000180006A66), ref: 0000000180007B55
                              • LeaveCriticalSection.KERNEL32(?,?,bootstrap,00000000,0000000180006A66), ref: 0000000180007B77
                              • WaitForSingleObject.KERNEL32(?,?,bootstrap,00000000,0000000180006A66), ref: 0000000180007B89
                              • EnterCriticalSection.KERNEL32(?,?,bootstrap,00000000,0000000180006A66), ref: 0000000180007B96
                              • LeaveCriticalSection.KERNEL32(?,?,bootstrap,00000000,0000000180006A66), ref: 0000000180007BAC
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ObjectSingleWait
                              • String ID: /_ServerStatus$bootstrap
                              • API String ID: 1755037574-130918473
                              • Opcode ID: 9eb958907503b538cfff137fec2646ad1a707b5eed82fa35041749c7d3116e58
                              • Instruction ID: a05a9ca6cab213d071a7201c093994c89e936c8f311dc16310d987ad1a324c2b
                              • Opcode Fuzzy Hash: 9eb958907503b538cfff137fec2646ad1a707b5eed82fa35041749c7d3116e58
                              • Instruction Fuzzy Hash: F2511436210A49CAEB928B11F8953D873A1F78DB86F55C121EE4D537A0CF79C69EC340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32 ref: 000000018000DDD1
                              • LeaveCriticalSection.KERNEL32 ref: 000000018000DDDE
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                                • Part of subcall function 000000018002A720: EnterCriticalSection.KERNEL32(?,?,?,000000018000DE1C), ref: 000000018002A747
                                • Part of subcall function 000000018002A720: LeaveCriticalSection.KERNEL32 ref: 000000018002A764
                                • Part of subcall function 000000018002A720: WaitForSingleObject.KERNEL32 ref: 000000018002A773
                                • Part of subcall function 000000018002A720: EnterCriticalSection.KERNEL32 ref: 000000018002A77D
                                • Part of subcall function 000000018002A720: SetEvent.KERNEL32(?,?,?,000000018000DE1C), ref: 000000018002A7C7
                                • Part of subcall function 000000018002A720: SetEvent.KERNEL32 ref: 000000018002A7D7
                                • Part of subcall function 000000018002A720: LeaveCriticalSection.KERNEL32 ref: 000000018002A7E1
                              • EnterCriticalSection.KERNEL32 ref: 000000018000DEB6
                              • SetEvent.KERNEL32 ref: 000000018000DEDE
                              • LeaveCriticalSection.KERNEL32 ref: 000000018000DEEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Event$CurrentObjectSingleThreadWait
                              • String ID: ..\src\global_state.c$[%s:%d] %s: callback Q thread exiting$[%s:%d] %s: callback Q thread started$run_queue_cb
                              • API String ID: 4222902948-3667148152
                              • Opcode ID: 039c9572e23054b82063d7eefe3be83b922dd5212fded71edc57744f7649869b
                              • Instruction ID: 1cca8a9db4d77c4b10ee6001e2193c957e0ce12eaff444aaeadaf8d164c6a068
                              • Opcode Fuzzy Hash: 039c9572e23054b82063d7eefe3be83b922dd5212fded71edc57744f7649869b
                              • Instruction Fuzzy Hash: B4415A3521064D82EAD6FF15E8683E93362F79DB80F15C426A90A4B3B1CE38CB4DC351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Ioctl$CloseCreateHandle$CompletionCountCriticalInitializePortSectionSemaphoreSpinclosesocketsocket
                              • String ID:
                              • API String ID: 292372088-0
                              • Opcode ID: af75cb7e055b23f3d3fea0101285e7762915e6d512d5540f9432bc1b99ef9a55
                              • Instruction ID: 17857b3395490d8332481039e521f9b15836d62bcd75ec1a93c47590b9067488
                              • Opcode Fuzzy Hash: af75cb7e055b23f3d3fea0101285e7762915e6d512d5540f9432bc1b99ef9a55
                              • Instruction Fuzzy Hash: 28819D36201B448AEBA1CF60E4543DD77B5F788798F408229EE9A17B98DF3AC659C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$CurrentThread
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), '%s', ... ) => 0 $[%s:%d] %s: set proxy name: %s ( rc = %d )$[%s:%d] %s: set proxy pass: %p ( rc = %d )$[%s:%d] %s: set proxy user: %s ( rc = %d )$[%s:%d][ERR] %s: (%p, %d (%s), '%s', ... ) => %d %s$__bdnimbus_set_optionv
                              • API String ID: 1614919063-2398511795
                              • Opcode ID: f535a6f429b1c4c2ad5f6ff5289d2b54ee42c6337dcc141ba4736c23fed0c20d
                              • Instruction ID: b3baf9a2f3de947c0f612e92c8bfeb295f5f432392326d1dbb2a6e88e7266ff5
                              • Opcode Fuzzy Hash: f535a6f429b1c4c2ad5f6ff5289d2b54ee42c6337dcc141ba4736c23fed0c20d
                              • Instruction Fuzzy Hash: B651E236204B4886E6E3DB14F8483DAB3A5F78D390F54811AFA8A47795DF79C74C8705
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Timetime
                              • String ID: ..\src\request.c$[%s:%d] %s: %.*s$[%s:%d][ERR] %s: req %p (%s) finished with %d (%s), alived %u ms, uc: %p$disabledServices$parse_e429_response$request_finish$retryAfter
                              • API String ID: 17336451-2053248451
                              • Opcode ID: 5cb9198d55c79fed7f845b8fdc01a5d57c37ee0f844bdc26eb7b77a30a42d1e2
                              • Instruction ID: 7040ac98332650cab1113c3b264cce5b26bdce49f7bcc8696eb15c555fb06eed
                              • Opcode Fuzzy Hash: 5cb9198d55c79fed7f845b8fdc01a5d57c37ee0f844bdc26eb7b77a30a42d1e2
                              • Instruction Fuzzy Hash: CFB18C32605F8882EBA79B56E8543EA73A4FB8DBC0F448115EE5947BA1DF38D6198700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$EventLeave
                              • String ID: ..\src\upload\upload.c$[%s:%d] %s: calling user_context_signal_uninit$[%s:%d] %s: signal user thread (due to BDNC_CTX_F_WAIT_4_UPLOADS)$[%s:%d] %s: upload->active_req->uc = NULL;$upload_cancel_context_req
                              • API String ID: 2312473273-1064316082
                              • Opcode ID: 5f766c7356f2ebd719f09cc95e00e2bd64462dd0e70fe549c9ba7dc7e5c4f2e5
                              • Instruction ID: f11d5cbc34f869a7b0e42f8cc431a4f3d37f080c9e7098246a7c8b5a72dced1a
                              • Opcode Fuzzy Hash: 5f766c7356f2ebd719f09cc95e00e2bd64462dd0e70fe549c9ba7dc7e5c4f2e5
                              • Instruction Fuzzy Hash: 13516132200F8885EBA2CF25E8903D973A1F788BC8F588125EB8D57B64CF78C649C744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons$htonl
                              • String ID: %d.%d.%d.%d$%s:%d$<addr with socktype %d>$[%s]:%d
                              • API String ID: 3369762329-1216508268
                              • Opcode ID: 609c90a3c106093d1d179caaecd49baa5310451ddba33a930813c85da8563603
                              • Instruction ID: 9efbf095c0dd8a5504d8049cbc0fd497cd8c6c67e16c623c4e0958e94c4f9775
                              • Opcode Fuzzy Hash: 609c90a3c106093d1d179caaecd49baa5310451ddba33a930813c85da8563603
                              • Instruction Fuzzy Hash: 9831D032204A9C86E7A59F11E8547FAB361F748BC9F40C022EA8A07795DFBCC20DC754
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorIoctlLast
                              • String ID: ..\src\win\net_awareness.c$[%s:%d] %s: WSAIoctl: %u %s ( was %u )$global_state_init$set_notify_for_routing
                              • API String ID: 4052769934-1785990878
                              • Opcode ID: c60331c274bdd641438baebe408ac386b012b3594fe0e58bde1bb7a96aa94271
                              • Instruction ID: a5c4c05b9dd9169a1091c8590d96c415d745f0709d46988db7431300ea6b850b
                              • Opcode Fuzzy Hash: c60331c274bdd641438baebe408ac386b012b3594fe0e58bde1bb7a96aa94271
                              • Instruction Fuzzy Hash: 5C31C132314B488AE3919F21F48878E77A5F38C7A0F654125FA9E43760DF79CA49CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018004F700: GetSystemDirectoryA.KERNEL32 ref: 000000018004F728
                                • Part of subcall function 000000018004F700: LoadLibraryA.KERNEL32 ref: 000000018004F7A4
                              • GetProcAddress.KERNEL32(00000000,global_state_init,00000001,00000001800517F0), ref: 0000000180074721
                              • GetProcAddress.KERNEL32 ref: 0000000180074734
                              • QueryPerformanceFrequency.KERNEL32(00000000,global_state_init,00000001,00000001800517F0), ref: 000000018007475B
                              • QueryPerformanceCounter.KERNEL32 ref: 000000018007476A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: AddressPerformanceProcQuery$CounterDirectoryFrequencyLibraryLoadSystem
                              • String ID: GetTickCount$GetTickCount64$global_state_init$kernel32.dll
                              • API String ID: 2776266448-3976587219
                              • Opcode ID: 9de8c2cd129278b1a836ca67e1f9b88983c896e1e562f8e79040fb132cc13fd1
                              • Instruction ID: d26e0a64a4493626af3eccd2c43ee1c9dff3afb5016bb678955f1b0d74bc0cb1
                              • Opcode Fuzzy Hash: 9de8c2cd129278b1a836ca67e1f9b88983c896e1e562f8e79040fb132cc13fd1
                              • Instruction Fuzzy Hash: 6A21AE33915F4482E782CF25E8443A963A1FB9EB98F15D221FA4D1A250FFB9C6D9C300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentObjectSingleThreadWait
                              • String ID: ..\src\api.c$[%s:%d][ERR] %s: WaitForSingleObject error: %d$bdnimbus_ask_ctx_wait
                              • API String ID: 179774263-1127040622
                              • Opcode ID: 4856455216e1ade61b418de75d4e4e971b4b49c36b617b596058301190f6d8a2
                              • Instruction ID: 9fdab854352f808565ed66c7b3b2b3bfefabb1a75745a7a5dfd1771561dde262
                              • Opcode Fuzzy Hash: 4856455216e1ade61b418de75d4e4e971b4b49c36b617b596058301190f6d8a2
                              • Instruction Fuzzy Hash: 1A115136604B0482EBA29F24E84838A7771F78DB90F549115EE8A577A8CF7DCB8DC744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$EventObjectSingleWait$CloseCurrentHandleThread
                              • String ID: ..\src\global_state.c$[%s:%d] %s: main thread is waiting for GLOBAL_STATE_F_QUEUE_CB_TH$stop_and_wait_for_queue_cb_thread
                              • API String ID: 182355978-2003621415
                              • Opcode ID: 82b754fbdb0cc1d2c8d7fd93d35b5d8f3757da05c064168f054269f8a33b6585
                              • Instruction ID: 940b230d548f313aac0ebcf407b645f4f1a45a7fc84e10fe66e931c5ee4505f8
                              • Opcode Fuzzy Hash: 82b754fbdb0cc1d2c8d7fd93d35b5d8f3757da05c064168f054269f8a33b6585
                              • Instruction Fuzzy Hash: 2021FF38224A488AEAC28B05F8997D47361B75E7A0F818A01E81A973B0DF7CC74D8745
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeaveObjectSingleWait$CloseCurrentHandleThread
                              • String ID: ..\src\global_state.c$[%s:%d] %s: main thread is waiting for GLOBAL_STATE_F_BASE_NET_TH$stop_and_wait_for_network_thread
                              • API String ID: 824138704-1339108529
                              • Opcode ID: ed84b774268d298ace03d3419181603a2dd9baa3d8222c104fdb242a9160848b
                              • Instruction ID: 584f7307129af4e77f02be21a6a621d524ac4c4d5891b2f805795696a78cd406
                              • Opcode Fuzzy Hash: ed84b774268d298ace03d3419181603a2dd9baa3d8222c104fdb242a9160848b
                              • Instruction Fuzzy Hash: EE11EF38214A4886EAD69F14F8A87D47361BB8D7A4F458615AC1AA67B0CF6AC70DC305
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                              • String ID:
                              • API String ID: 1330151763-0
                              • Opcode ID: 7d477e3dbcdc1afbc5002e0a13d68bbc2d3a54585df8d0be353f78d9fc5a743e
                              • Instruction ID: faca5aab624e0fca4e7bc230a98309656351223b82a9db2ead8856a2abd9d567
                              • Opcode Fuzzy Hash: 7d477e3dbcdc1afbc5002e0a13d68bbc2d3a54585df8d0be353f78d9fc5a743e
                              • Instruction Fuzzy Hash: A3C1B136721A4885EB91CFA9D4847ED3762F34EBA8F028205DE6A977E4CF75C659C300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalLeaveSection
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), %d ... ) => 0 $[%s:%d] %s: (%p, %d (%s), %p, ... ) => 0 $[%s:%d] %s: (%p, %d (%s), '%s', ... ) => 0 $[%s:%d][ERR] %s: (%p, %d (%s), %d ... ) => %d %s$[%s:%d][ERR] %s: (%p, %d (%s), %p, ... ) => %d %s$[%s:%d][ERR] %s: (%p, %d (%s), '%s', ... ) => %d %s$__bdnimbus_set_optionv
                              • API String ID: 3988221542-1200060697
                              • Opcode ID: d4aad92e9995a5dbe60300a9fe24993a70a6f89ebd8eb29bd7e11578dc14db27
                              • Instruction ID: 4b2b828e3f1018bc54856b40711e2704bf5fe2cc09988ae27c2be7239d6c037b
                              • Opcode Fuzzy Hash: d4aad92e9995a5dbe60300a9fe24993a70a6f89ebd8eb29bd7e11578dc14db27
                              • Instruction Fuzzy Hash: 5D511D32204B4882E6A3DF04F4853DEB7A9F789390F54811AFA8A57B99DF79C74D8704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID: ..\src\global_state.c$[%s:%d] %s: deleted %p( %p %p )$[%s:%d] %s: deleted %p( %p %p ) POSTPONED!!!$[%s:%d] %s: not found %p$del_generic_cb
                              • API String ID: 2978645861-2112457589
                              • Opcode ID: 4c3429c61565d443c7b03338e9660710c190f01d61a877a1922624940bd3761a
                              • Instruction ID: 1b96c8d13916760ec01447b88cb7b5ae01fa1650c71a4c83d5d903787271a89d
                              • Opcode Fuzzy Hash: 4c3429c61565d443c7b03338e9660710c190f01d61a877a1922624940bd3761a
                              • Instruction Fuzzy Hash: 17414935204F4886EB92CF11F898399B3A5F74CB98F448026EE8E47768DF78CA59C744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,FFFFFFFF,0000000180007E95,?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 000000018000D8FF
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,FFFFFFFF,0000000180007E95,?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 000000018000D924
                                • Part of subcall function 0000000180023510: EnterCriticalSection.KERNEL32(?,?,00000000,0000000180019A64), ref: 0000000180023529
                                • Part of subcall function 0000000180023510: LeaveCriticalSection.KERNEL32(?,?,00000000,0000000180019A64), ref: 0000000180023544
                                • Part of subcall function 00000001800230C0: EnterCriticalSection.KERNEL32(?,?,?,?,?,000000018001988F), ref: 00000001800230DF
                                • Part of subcall function 00000001800230C0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,000000018001988F), ref: 00000001800231AB
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,FFFFFFFF,0000000180007E95,?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 000000018000D9AC
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,FFFFFFFF,0000000180007E95,?,?,?,?,00000000,00000000,order_benchmark,00000001800065A4), ref: 000000018000DA3D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\global_state.c$[%s:%d] %s: new runtime_settings: %p | old: %p$[%s:%d][WARN] %s: new_rt_setts not set!$runtime_settings_reconfiguration$set_runtime_configuration
                              • API String ID: 3168844106-171095035
                              • Opcode ID: 4620e804b6823204836979436af67620b0dfd3ac33ef004efcf27bfac2388db2
                              • Instruction ID: 6a4774551b0dfa83a4dc06bef9207b4e29dc8a2676d8b233fe4cef0371954f69
                              • Opcode Fuzzy Hash: 4620e804b6823204836979436af67620b0dfd3ac33ef004efcf27bfac2388db2
                              • Instruction Fuzzy Hash: 0331F134205B4C84EAC3EB51F8993E973A5BB8D780F45C526AC5E57BA1EF68C70C8351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EventLeave$Enter$ObjectSingleWait
                              • String ID:
                              • API String ID: 566905196-0
                              • Opcode ID: edcc3c41415538bfc390ca1367e41471408fad6d3b14c990d2f526ed5bc4f478
                              • Instruction ID: e7f0873e16b5b19b95d44be1a8ecf77a3a54f3baf0cc91199f1c5f191f7c112c
                              • Opcode Fuzzy Hash: edcc3c41415538bfc390ca1367e41471408fad6d3b14c990d2f526ed5bc4f478
                              • Instruction Fuzzy Hash: 1A317F36615A48C6EBD68F20D85839833B1FB49F99F04D011EA0A466A8DF79CECEC744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThread
                              • String ID: ..\src\rpc\rpc_server.c$[%s:%d] %s: deserialize_bdnimbus_upload_mem_inline failed$[%s:%d] %s: uc->del_upload_cb: %p$[%s:%d] %s: uc->rpc_del_upload_cb:%p, rpc->rpc_del_upload_ctx:%p$bdnc_rpc_upload_mem$call_upload_del_cb
                              • API String ID: 2351996187-1633071430
                              • Opcode ID: 0a14d611b7958ed79a7f28d566651cf0ac4f786f8b53df557a9a83989b5442e8
                              • Instruction ID: c3af8545dcf07a6a505f726fb4bb8314b54817288c936cb3fb66b1716a8c6aa0
                              • Opcode Fuzzy Hash: 0a14d611b7958ed79a7f28d566651cf0ac4f786f8b53df557a9a83989b5442e8
                              • Instruction Fuzzy Hash: 9BD18B76605B889AEB92DFA1E4447DE33B5F348B88F418226EE4D2BB45DF34C259C340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThreadTimetime
                              • String ID: ..\src\bdnc_conn.c$[%s:%d] %s: HTTP/1.0 -> bdnc_conn_read_cb$[%s:%d] %s: [%p] reconnect for %s/%s ( eof: %d, reset: %d )$[%s:%d] %s: finish with error %d for conn %p, pending_cb: %d$[%s:%d][ERR] %s: verify result = %s$bdnc_conn_event_cb
                              • API String ID: 3735742524-967673846
                              • Opcode ID: 6e6b67173464e17977284189583b3937e8685d35ccbcf551b64d19319810eb64
                              • Instruction ID: 6c514ad553dea33484b7f7ee02ae49dc2bfddd32306905c10365512579a3f139
                              • Opcode Fuzzy Hash: 6e6b67173464e17977284189583b3937e8685d35ccbcf551b64d19319810eb64
                              • Instruction Fuzzy Hash: 8AB19D32200B4986FBE79F21E4543E933A1B78C7C8F588125EE4A47696CF79C748C750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htonl
                              • String ID: %d.%d.%d.%d$::%d.%d.%d.%d$::%x:%d.%d.%d.%d$AF_INET$AF_UNSPEC$resolve_proxy_name
                              • API String ID: 2009864989-1222235624
                              • Opcode ID: 4c01e5d969d9f24989f037145770978b6622f66a7725fe1f30cbcd25998b7539
                              • Instruction ID: f2f21ef3280e0569db12a15c33e6ab86d1d04236031b790e1717f1e3bc634973
                              • Opcode Fuzzy Hash: 4c01e5d969d9f24989f037145770978b6622f66a7725fe1f30cbcd25998b7539
                              • Instruction Fuzzy Hash: 43915B326086E845E7E64B16A080BFAAFA0E75E7C9F159025FBD543BD1DB3CCA44C709
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$CurrentEnterThread
                              • String ID: %02d-%02d-%04d %02d:%02d:%02d$[%u][%x]
                              • API String ID: 2905768538-2640658925
                              • Opcode ID: 9b6a27e051363e1507048ae24a9b5629dd95297ee78633f70037b90ec4d32421
                              • Instruction ID: ef81d45ae3b7ff6b1553c9d0bed3767ea04715abbf16eec18a61b164b1448ca7
                              • Opcode Fuzzy Hash: 9b6a27e051363e1507048ae24a9b5629dd95297ee78633f70037b90ec4d32421
                              • Instruction Fuzzy Hash: 2A81087260878886D7A5CF15E8403D9B7A6F7CC784F448116EB9AC7B99CF78C608CB04
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentDeleteEventFileThread
                              • String ID: ..\src\upload\upload_request.c$[%s:%d] %s: signal user thread (due to BDNC_CTX_F_WAIT_4_UPLOADS)$upload_request_destroy
                              • API String ID: 1858711550-450168033
                              • Opcode ID: a4ecf4f0fd60b557a4e68960f919b471bd5fa657e3d4f70fa77d325f88bd54ce
                              • Instruction ID: 4f34fc86f00e2ab98ad9473e39cb4686a54bd963291c308212b1a3de00b0d32f
                              • Opcode Fuzzy Hash: a4ecf4f0fd60b557a4e68960f919b471bd5fa657e3d4f70fa77d325f88bd54ce
                              • Instruction Fuzzy Hash: FE517032B05B8485FB92CF64C5903E92361EB9EB8CF199235AE4D46259DF70CA94C319
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FreeLibrary.KERNEL32(?,00000000,00000000,00000001802466E2,?,?,00000030,000000018023EA64), ref: 000000018024646B
                              • GetProcAddress.KERNEL32(?,00000000,00000000,00000001802466E2,?,?,00000030,000000018023EA64), ref: 0000000180246477
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: AddressFreeLibraryProc
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 3013587201-537541572
                              • Opcode ID: 811f19c18a3efcdefff856f236ed497edf66aae4bfda2973178c105d00040c0a
                              • Instruction ID: 069f3964ad5436ca78a4ef1f19adfe0ea66ff5aa25f048deb4a46c95e59106e3
                              • Opcode Fuzzy Hash: 811f19c18a3efcdefff856f236ed497edf66aae4bfda2973178c105d00040c0a
                              • Instruction Fuzzy Hash: 3F41C471311E4841FFA7DB16A89C7D623A6B74DBE0F09C125AD1987794EEBCC64D8340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: freeaddrinfogetaddrinfo
                              • String ID: 1.2.3.4
                              • API String ID: 1109861670-961314917
                              • Opcode ID: 56dd9588c4faf3cc82696c023dc4a23791f160c13d6ed4cf75c04c82520fd995
                              • Instruction ID: 41649376475ddf57a752597658049daa98fbf412abe65550830a9091164eb7b6
                              • Opcode Fuzzy Hash: 56dd9588c4faf3cc82696c023dc4a23791f160c13d6ed4cf75c04c82520fd995
                              • Instruction Fuzzy Hash: 99413EB2605B48C5EB92CF15E4443A973A2FB8DBD0F64C126EA5D43764DF79C648CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • CertGetNameStringA.CRYPT32 ref: 000000018001D5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCurrentEnterLeaveNameStringThread
                              • String ID: ..\src\ssl\ssl_ctx.c$No error found for this certificate or chain.$This certificate is self-signed.$[%s:%d] %s: TrustStatus: %s$[%s:%d] %s: [%d,%d] subject %s$[%s:%d][ERR] %s: TrustStatus: %s
                              • API String ID: 2895763960-2601876936
                              • Opcode ID: 89a4d313c60c7cc81da759525584a5d9207bc9e580a29a333887a73ce4be9539
                              • Instruction ID: 79b1095e530f3e4dee1b6a024bac06800fcbc1c18140509c10ad2506a68a8c27
                              • Opcode Fuzzy Hash: 89a4d313c60c7cc81da759525584a5d9207bc9e580a29a333887a73ce4be9539
                              • Instruction Fuzzy Hash: 4F314C36204E8896E7B68B14E4993DA7761F38C798F448116EA8E47B94DF7DC748CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • CertGetNameStringA.CRYPT32 ref: 000000018001D5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCurrentEnterLeaveNameStringThread
                              • String ID: ..\src\ssl\ssl_ctx.c$This certificate is self-signed.$This certificate or one of the certificates in the certificate chain is not time-valid.$[%s:%d] %s: TrustStatus: %s$[%s:%d] %s: [%d,%d] subject %s$[%s:%d][ERR] %s: TrustStatus: %s
                              • API String ID: 2895763960-830705213
                              • Opcode ID: 503f0c5cbf34da30294bcea99caaab83463e86928f2f9d1e47575ddc0bcdabcf
                              • Instruction ID: 6f54ae76759b5c264b688fad59f5977cbe135bb4cd10e7558c4c5f7153410dd5
                              • Opcode Fuzzy Hash: 503f0c5cbf34da30294bcea99caaab83463e86928f2f9d1e47575ddc0bcdabcf
                              • Instruction Fuzzy Hash: 50313A36204E8896E7A68B14E4993DA7762F38C798F448116EA8E47B94DF79C748CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • CertGetNameStringA.CRYPT32 ref: 000000018001D5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCurrentEnterLeaveNameStringThread
                              • String ID: ..\src\ssl\ssl_ctx.c$This certificate is self-signed.$Trust for this certificate or one of the certificates in the certificate chain has been revoked.$[%s:%d] %s: TrustStatus: %s$[%s:%d] %s: [%d,%d] subject %s$[%s:%d][ERR] %s: TrustStatus: %s
                              • API String ID: 2895763960-4012600948
                              • Opcode ID: fda515c3e43c88a5b9233a4db1a2378157ecfb75e1ee87bbaffb32dc0bf07716
                              • Instruction ID: cd0fe6b6f41bf1a75b88395d5e8bb9e48ad6fc80c466849558e6c1f1b23b628a
                              • Opcode Fuzzy Hash: fda515c3e43c88a5b9233a4db1a2378157ecfb75e1ee87bbaffb32dc0bf07716
                              • Instruction Fuzzy Hash: C7314C36204E8896E7F68B14E4993DA7762F38C798F448116EA8E47B94DF7DC748CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • CertGetNameStringA.CRYPT32 ref: 000000018001D5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCurrentEnterLeaveNameStringThread
                              • String ID: ..\src\ssl\ssl_ctx.c$The certificate or one of the certificates in the certificate chain does not have a valid signature.$This certificate is self-signed.$[%s:%d] %s: TrustStatus: %s$[%s:%d] %s: [%d,%d] subject %s$[%s:%d][ERR] %s: TrustStatus: %s
                              • API String ID: 2895763960-2905763976
                              • Opcode ID: dfb2fec7097f1169fdf249581eb298fc9e9399a857d40d4d43a018abc079b935
                              • Instruction ID: 2879c2942f376f5939b7c700de4183f0adaebe04e464ef5eec7d4fc7123ebb18
                              • Opcode Fuzzy Hash: dfb2fec7097f1169fdf249581eb298fc9e9399a857d40d4d43a018abc079b935
                              • Instruction Fuzzy Hash: 42314C36204E8896E7F68B14E4993DA7762F38C798F448116EA8E47B94DF7DC748CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • CertGetNameStringA.CRYPT32 ref: 000000018001D5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCurrentEnterLeaveNameStringThread
                              • String ID: ..\src\ssl\ssl_ctx.c$The certificate or certificate chain is not valid in its proposed usage.$This certificate is self-signed.$[%s:%d] %s: TrustStatus: %s$[%s:%d] %s: [%d,%d] subject %s$[%s:%d][ERR] %s: TrustStatus: %s
                              • API String ID: 2895763960-4000714078
                              • Opcode ID: 50b0b4a3b8a5898d935d5fef6c394c3e68ea6e2d0cc9ce99bf4d94d9bca4ae40
                              • Instruction ID: 8a0950370153c62395282abaedcb2ab3eeeb98f349accf578229e3d619235a70
                              • Opcode Fuzzy Hash: 50b0b4a3b8a5898d935d5fef6c394c3e68ea6e2d0cc9ce99bf4d94d9bca4ae40
                              • Instruction Fuzzy Hash: DD314C36204E8896E7F68B14E4993DA7762F38C798F448116EA8E47B94DF7DC748CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • CertGetNameStringA.CRYPT32 ref: 000000018001D5FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCurrentEnterLeaveNameStringThread
                              • String ID: ..\src\ssl\ssl_ctx.c$The certificate or certificate chain is based on an untrusted root.$This certificate is self-signed.$[%s:%d] %s: TrustStatus: %s$[%s:%d] %s: [%d,%d] subject %s$[%s:%d][ERR] %s: TrustStatus: %s
                              • API String ID: 2895763960-1692811234
                              • Opcode ID: a8c9fa18192722c6abe0691c66f9de96f2c88a7818a8bd8ed989c2eac07d21cd
                              • Instruction ID: f11c647ee2e59f9f93dc9556567bd4d1f07d186dcdfa9fca0ddee45fcb4e5060
                              • Opcode Fuzzy Hash: a8c9fa18192722c6abe0691c66f9de96f2c88a7818a8bd8ed989c2eac07d21cd
                              • Instruction Fuzzy Hash: 46314C36204E8896E7F68B14E4997DA7762F38C798F448116EA8E47B94DF7DC748CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorIoctlLast
                              • String ID: ..\src\win\net_awareness.c$[%s:%d] %s: WSAIoctl: %u %s ( was %u )$set_notify_for_addr_list
                              • API String ID: 4052769934-1125124881
                              • Opcode ID: d86c0f8c3bf2b8a479e782c4ad6054cd258662b04071cec794a70966361a2414
                              • Instruction ID: 0883a04876e2a1ef11a0fcdba47e412b37c60e203ad391151f4b21d98d00016d
                              • Opcode Fuzzy Hash: d86c0f8c3bf2b8a479e782c4ad6054cd258662b04071cec794a70966361a2414
                              • Instruction Fuzzy Hash: 1021A232608B4886E3919F14F48878E77A5F38C794F644129F79E43B64DF39C949CB04
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$Leave$ObjectSingleWait
                              • String ID: /bdnc/config
                              • API String ID: 3202826245-1471951825
                              • Opcode ID: 1a081b4b3b7ff62cb6e9ac89dc87fec0de7d7e05d18e58109ce4068a5418e5fb
                              • Instruction ID: 918dd7174c8e9d2e5bfc1052dc23328c7d6cd76beaa8d12d47a2aa5ee088da03
                              • Opcode Fuzzy Hash: 1a081b4b3b7ff62cb6e9ac89dc87fec0de7d7e05d18e58109ce4068a5418e5fb
                              • Instruction Fuzzy Hash: 9E21A235211A0899EBC2CB14F8993D833A6F74DB46F55C121E94A523B0DFBAC79EC304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,wait_for_context_free,0000000180047E94,?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 00000001800486C1
                              • LeaveCriticalSection.KERNEL32(?,?,wait_for_context_free,0000000180047E94,?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 00000001800486D8
                              • WaitForSingleObject.KERNEL32(?,?,wait_for_context_free,0000000180047E94,?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 00000001800486E7
                              • EnterCriticalSection.KERNEL32(?,?,wait_for_context_free,0000000180047E94,?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 00000001800486F1
                              • WaitForSingleObject.KERNEL32(?,?,wait_for_context_free,0000000180047E94,?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 000000018004870B
                              • CloseHandle.KERNEL32(?,?,wait_for_context_free,0000000180047E94,?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 0000000180048715
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterObjectSingleWait$CloseHandleLeave
                              • String ID: wait_for_context_free
                              • API String ID: 14126859-400412057
                              • Opcode ID: 067c26eb05d6341be3d7c410d7f016947cd0d2a58d1ce12998e5f7b22b8d3a52
                              • Instruction ID: faa86e63e99f929e24153d3cb05489b5eaad1c58e9a6be0d31d7a42ab81c7900
                              • Opcode Fuzzy Hash: 067c26eb05d6341be3d7c410d7f016947cd0d2a58d1ce12998e5f7b22b8d3a52
                              • Instruction Fuzzy Hash: 1E011236210E0483DBD18F24D8983983365FB5DB68F109211EE57966E4CF35C98EC745
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,000000018002C1E9,?,?,00000000,000000018002C83F), ref: 000000018002CE84
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,000000018002C1E9,?,?,00000000,000000018002C83F), ref: 000000018002CEB3
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,000000018002C1E9,?,?,00000000,000000018002C83F), ref: 000000018002CEC0
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,000000018002C1E9,?,?,00000000,000000018002C83F), ref: 000000018002CEFA
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,000000018002C1E9,?,?,00000000,000000018002C83F), ref: 000000018002CF09
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID: ..\src\push_conn.c$[%s:%d][ERR] %s: bdnc_conn_send_request failed %d$push_connection_open
                              • API String ID: 2978645861-3597901987
                              • Opcode ID: 09b6c439917777657a4ce4be6900d6df4ce36ccb9258c5528812c6ff56c3ca16
                              • Instruction ID: 06ae97e0176cf36e9581fbb8113113edc06894ddb73c123febbde2dd4a8267d0
                              • Opcode Fuzzy Hash: 09b6c439917777657a4ce4be6900d6df4ce36ccb9258c5528812c6ff56c3ca16
                              • Instruction Fuzzy Hash: C2515635201B4885EBD3AF61E8903E973A5F78CB84F088432EE4A477A5DF78C649C341
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterEvent$ObjectSingleWait
                              • String ID:
                              • API String ID: 1746239557-0
                              • Opcode ID: 34779330f159c25ec2c15b414f99b4598b826a73481a0bff5d138f25335823df
                              • Instruction ID: 6c1c52e891d6639d8eae6d0d96d5dc3bcafb54306510f89d0e07e7e39c53ca8b
                              • Opcode Fuzzy Hash: 34779330f159c25ec2c15b414f99b4598b826a73481a0bff5d138f25335823df
                              • Instruction Fuzzy Hash: BF312F36614A48C7EBD69F25E85839C7361F749F49F089011EB4A876A8DF39CD8ECB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: f$p$p
                              • API String ID: 3215553584-1995029353
                              • Opcode ID: 47e2dc1a9d14f18961fa778694a57ed7105e7571ba05d49e7aca47af43d18681
                              • Instruction ID: d2bd8444d3f23c7f3e25602cdd66a4f33f255346cbaaad4e31f01f1fa6e2c521
                              • Opcode Fuzzy Hash: 47e2dc1a9d14f18961fa778694a57ed7105e7571ba05d49e7aca47af43d18681
                              • Instruction Fuzzy Hash: 6112C77260414986FBA69E95E04C7E9F763F398750F94C212EAC247AC4CFF9C7888B54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeavehtons
                              • String ID: ..\src\user_context.c$[%s:%d] %s: proxy info are the same$set_proxy_for_local_cloud
                              • API String ID: 1768908292-2023176744
                              • Opcode ID: dc1b21991c8ab9e02b1775b7c98a2b3344a59050df09cb475f41f34ee80f500d
                              • Instruction ID: e65824a77cf8ba9d9f9ba2cb6f98eb1d6c197f1b556284911918d0e552be233b
                              • Opcode Fuzzy Hash: dc1b21991c8ab9e02b1775b7c98a2b3344a59050df09cb475f41f34ee80f500d
                              • Instruction Fuzzy Hash: 66126C22E15FC886EB66CF7885403FD6360F7A9788F15E215EF8912656EF74A2D9C300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • timeGetTime.WINMM ref: 000000018001FADE
                              • htons.WS2_32 ref: 000000018001FB48
                              • htons.WS2_32 ref: 000000018001FBB8
                                • Part of subcall function 000000018001B530: EnterCriticalSection.KERNEL32(?,?,00000000,00000001800219E1,?,?,?,?,?,000000018001F538,?,?,?,?,?,000000018001F5C2), ref: 000000018001B544
                                • Part of subcall function 000000018001B530: LeaveCriticalSection.KERNEL32(?,?,00000000,00000001800219E1,?,?,?,?,?,000000018001F538,?,?,?,?,?,000000018001F5C2), ref: 000000018001B559
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSectionhtons$EnterLeaveTimetime
                              • String ID: ..\src\bdnc_conn.c$[%s:%d][ERR] %s: retcode %d | IPv%d$bdnc_conn_connect_to
                              • API String ID: 3844482643-1465590489
                              • Opcode ID: 5801169d488d35aa2e66517d5a2cf4945a3907b25ac88b8cd0e6cb39b6ce4d93
                              • Instruction ID: ddfd2835b1c4ecefc2bc64bc78f713a08cce69926846ee01bfcaaed69ad7298f
                              • Opcode Fuzzy Hash: 5801169d488d35aa2e66517d5a2cf4945a3907b25ac88b8cd0e6cb39b6ce4d93
                              • Instruction Fuzzy Hash: 9C818172A14B8883E7A28F35D5513E973A0FB5D784F48D225EF8906656EF78E398C340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThreadTimetime
                              • String ID: ..\src\dns_client.c$[%s:%d] %s: delta = %d for %s$[%s:%d] %s: resending ipv4 request for %s$[%s:%d] %s: resending ipv6 request for %s$dns_client_resend_req
                              • API String ID: 3735742524-2039202327
                              • Opcode ID: 138c332fd2258847834adbe3ac2881d0c501d889e6c687895f308dbf28d0e1b8
                              • Instruction ID: 29a22c4dcb176a97405ca33374420a4aa0fc1f10657263111aadc543ecd44e2f
                              • Opcode Fuzzy Hash: 138c332fd2258847834adbe3ac2881d0c501d889e6c687895f308dbf28d0e1b8
                              • Instruction Fuzzy Hash: 6241A0726097888BE782CF60E8503C977B0F388B98F448116EA8D83785DF7CC659C754
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\global_state.c$[%s:%d] %s: adding %p( %p %p )$[%s:%d] %s: modifying %p( %p %p )$[%s:%d] %s: modifying %p( %p %p ) POSTPONED!!!$add_generic_cb
                              • API String ID: 3168844106-1818589484
                              • Opcode ID: de5b69830b311a453271c436257550988254a9457b62ba25081f2930dd29f695
                              • Instruction ID: 795913124595cc02675c5d8c113375a72628c718f03657c69d321adfff6ff6ac
                              • Opcode Fuzzy Hash: de5b69830b311a453271c436257550988254a9457b62ba25081f2930dd29f695
                              • Instruction Fuzzy Hash: 20613A36204B4882EB92CF15F49439973A9F35CB98F148016EF8E47B68DF38D6A9C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: closesocket
                              • String ID: %s: could not reinitialize event mechanism$..\3rdparty\libevent\event.c
                              • API String ID: 2781271927-3269442241
                              • Opcode ID: 245a2c782f2341a591b1787f9e95fb1b915b8ab12a7e91ae7cf80be6a7f1ab03
                              • Instruction ID: b266cfb273c498e1dd8d81c21599455e184d791877a3e1b116572a7e66948342
                              • Opcode Fuzzy Hash: 245a2c782f2341a591b1787f9e95fb1b915b8ab12a7e91ae7cf80be6a7f1ab03
                              • Instruction Fuzzy Hash: 5551EE32700B889AE69ADB25D6803E963A1F74C7F0F548311BB79536D1DF31D6B98340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\global_state.c$[%s:%d] %s: skip %p (resolver_dirty:%d)$rt_setts_free_event_cb
                              • API String ID: 3168844106-1389472473
                              • Opcode ID: beeb78d7ac5b3c792651a3b0abcf1618421f90caaef306dd07ef4ba9e1b3f880
                              • Instruction ID: e39a89f86301e0fc4737947259033fd3a30c75aecac38f80efbc2039b3862313
                              • Opcode Fuzzy Hash: beeb78d7ac5b3c792651a3b0abcf1618421f90caaef306dd07ef4ba9e1b3f880
                              • Instruction Fuzzy Hash: 9C619136611B5888EB92CB60E8903DC73B8F74CB88F548526DE4D63B68DF38C659C750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalDeleteSection
                              • String ID: ..\src\conn_pool.c$[%s:%d] %s: %s %s$[%s:%d] %s: connections: %d, max %d, total %d$[%s:%d] %s: requests: ok %d, timeout %d, 404 %d, 4xx %d, 5xx %d, err %d , TOTAL %d ( received %u in %lu avg speed %lu)$dump_pool_stats
                              • API String ID: 166494926-2410711694
                              • Opcode ID: 5dfaa4e20397f967b4e8b92ddf3538969ee04d31920d68ab6c185acf05528763
                              • Instruction ID: bb35fd8c9f627c2d20535109c4e32ad6c448fc2c877c19a5d92d9724d9be8555
                              • Opcode Fuzzy Hash: 5dfaa4e20397f967b4e8b92ddf3538969ee04d31920d68ab6c185acf05528763
                              • Instruction Fuzzy Hash: 27513877204B84CBD7A1CF15E4807DAB7A1F38CB98F548116EA8A43B28DF79D659CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180006591), ref: 000000018000D6E7
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180006591), ref: 000000018000D7D0
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180006591), ref: 000000018000D801
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180006591), ref: 000000018000D866
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\global_state.c$[%s:%d] %s: calling callback %p( %p )$call_callback_list
                              • API String ID: 3168844106-1899174435
                              • Opcode ID: 2b48bc8958287a58f7ad15448b915052d1b217836762c9ad636c2b98c4a93f74
                              • Instruction ID: 537a6c87d4b8f8d61256ef27ec1536c5a3c0bbce35c018194b4583f0f72d1720
                              • Opcode Fuzzy Hash: 2b48bc8958287a58f7ad15448b915052d1b217836762c9ad636c2b98c4a93f74
                              • Instruction Fuzzy Hash: C351183A205F4885DB92CF25E49439873A5F74CF98F598126DE9D43368DF34CAA9C390
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSectionhtons$CurrentEnterLeaveThreadhtonl
                              • String ID: ..\src\dns_client.c$[%s:%d] %s: address = %s, port = %u$[%s:%d] %s: address = %s, scope = %u, port = %u$dns_client_get_first_ip_cb
                              • API String ID: 474373079-2763971249
                              • Opcode ID: de424b891416c0fc8b3b7d0c7f4385858e84e1b4817cec40c76c8c0aac486371
                              • Instruction ID: dc66ab27ba58395d15c1f9660868df85fc6543a1e19ba8c5867faf12a5c4e3bb
                              • Opcode Fuzzy Hash: de424b891416c0fc8b3b7d0c7f4385858e84e1b4817cec40c76c8c0aac486371
                              • Instruction Fuzzy Hash: 4C41A932A197C986D7A2CF20E4457EA73B1F79D344F40D216FA9943955EF78C698CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Create$EnterEventInitializeLeaveThread
                              • String ID:
                              • API String ID: 1702641810-0
                              • Opcode ID: 1ed007824a097f7cb57e4c36cc54dae6ea0aab7d0e6e7ce567bf2ba0e23ced35
                              • Instruction ID: ee79941e995427a8b1a2800e020f3bfbf1124fecc697b0c6033508826328d4df
                              • Opcode Fuzzy Hash: 1ed007824a097f7cb57e4c36cc54dae6ea0aab7d0e6e7ce567bf2ba0e23ced35
                              • Instruction Fuzzy Hash: F9416B35311B0882EB96EF20E8543D973A5FB8DB98F448625EE5E467A9DF38C65CC340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\ssl\ssl_ctx.c$<null>$[%s:%d] %s: '%s' / '%s'$[%s:%d][ERR] %s: SSL_CTX_load_verify_locations( %s, %s ) failed$ssl_set_cafile
                              • API String ID: 3168844106-574870105
                              • Opcode ID: b5fc41472998e5f567e328dd1e5212570c8cef32f1db8495c89dbf7b727b101b
                              • Instruction ID: 5f783dba8843dbbef727ba91ec3b79622dd5853df2bb65838fb58a2a809a4561
                              • Opcode Fuzzy Hash: b5fc41472998e5f567e328dd1e5212570c8cef32f1db8495c89dbf7b727b101b
                              • Instruction Fuzzy Hash: 30410771304B8885FB929B61E8453D973AABB8C7D4F408016AE4E93B64DF79C65DC701
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\ssl\ssl_ctx.c$<null>$[%s:%d] %s: '%s' / '%s'$[%s:%d][ERR] %s: SSL_CTX_load_verify_locations( %s, %s ) failed$ssl_set_cadir
                              • API String ID: 3168844106-3072686584
                              • Opcode ID: da029fcf94767fa848028a7cefce00be1309eaf601cceeb71b8403d51fe9a0a9
                              • Instruction ID: a15b3f44fccbce623c1167d6713580091d4300b5cf45e0c66aa58edc5ab0a670
                              • Opcode Fuzzy Hash: da029fcf94767fa848028a7cefce00be1309eaf601cceeb71b8403d51fe9a0a9
                              • Instruction Fuzzy Hash: 31315B31308B8881EB939B65E8813D663A6BB4C7D4F448016AD4D93BA4DFB9C74DC300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CreateCurrentEnterEventInitializeLeaveThread
                              • String ID: N$..\src\user_context.c$[%s:%d] %s: context %p$user_context_alloc
                              • API String ID: 78216027-3613468263
                              • Opcode ID: f21308f5de6151b9a500d2dfc5bd88609de848488b976866a4a316fe4df45184
                              • Instruction ID: 95827f0dd77ae004570a8cc8fb64766553f20dc6169e22a1291f9b47bf8ee76b
                              • Opcode Fuzzy Hash: f21308f5de6151b9a500d2dfc5bd88609de848488b976866a4a316fe4df45184
                              • Instruction Fuzzy Hash: 1631F736205F4485E7968F64F8903DA33A9FB4CB48F988136EA8D47759EF39C668C350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\ssl\ssl_ctx.c$[%s:%d] %s: disabling ssl session cache %p$[%s:%d] %s: enabling ssl session cache %p$ssl_cache_disable_nolock$ssl_cache_enable_nolock
                              • API String ID: 266293576-1428956281
                              • Opcode ID: 422440b229d4ed87566aae4be69e9391b44e28cae719272004d80937ca66b8ab
                              • Instruction ID: c8568b56e150789116b5bface2f7c7956d6c322b6337d634ee42ff725fa2a7ea
                              • Opcode Fuzzy Hash: 422440b229d4ed87566aae4be69e9391b44e28cae719272004d80937ca66b8ab
                              • Instruction Fuzzy Hash: FF21E534315B1D8AFBE39B61E8883D523AAB74D7A5F40C025AD49877A1EF79878DC340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,0000100100000200,000000018000684C), ref: 000000018001BE5F
                              • timeGetTime.WINMM(?,?,?,?,0000100100000200,000000018000684C), ref: 000000018001BEFC
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,0000100100000200,000000018000684C), ref: 000000018001BF0F
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThreadTimetime
                              • String ID: ..\src\ssl\ssl_ctx.c$[%s:%d][ERR] %s: SSL_CTX_load_verify_locations failed$ssl_reload_certs
                              • API String ID: 535464691-2800379527
                              • Opcode ID: bc805758313d33ec14c27c620cb1b6eeffffee58310d4e177e5c7dc6c8b31032
                              • Instruction ID: bc8d68683ba637ecfa3912148b2dc96da995a49de9cc6b1ac7fbd79769259688
                              • Opcode Fuzzy Hash: bc805758313d33ec14c27c620cb1b6eeffffee58310d4e177e5c7dc6c8b31032
                              • Instruction Fuzzy Hash: E1112874305A5885FBD79B25E8593E523A6BB8D7C1F44C016E90A866A1DF39C74DC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CertCertificateContextCreateCurrentEnterErrorLastLeaveThread
                              • String ID: ..\src\ssl\ssl_ctx.c$[%s:%d][ERR] %s: CertCreateCertificateContext failed %d$[%s:%d][ERR] %s: i2d_X509 failed!$x509_to_cert_context
                              • API String ID: 2957535492-2770004481
                              • Opcode ID: 4af7e0c3ef67d44e626c9504b50739684c83d0f8363336a906f1533cc26fea50
                              • Instruction ID: 59b62983645f46be8166496134814fa65f392fce480ef653bc1418771b2749db
                              • Opcode Fuzzy Hash: 4af7e0c3ef67d44e626c9504b50739684c83d0f8363336a906f1533cc26fea50
                              • Instruction Fuzzy Hash: 04115B35204B4881EB929B24E8453CA33A2AB4C784F808126FA4E437A5EFBEC34DC704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CloseDeleteEventHandle
                              • String ID:
                              • API String ID: 2132285870-0
                              • Opcode ID: d2d2199ee8c04a4b143c2ef6fd2045d29a06ea299de04015a6d79fac4834aab8
                              • Instruction ID: 220bf2a861041dd283c1eb6e0c179d186f64f6bd20d57d66d865f884cc45bd31
                              • Opcode Fuzzy Hash: d2d2199ee8c04a4b143c2ef6fd2045d29a06ea299de04015a6d79fac4834aab8
                              • Instruction Fuzzy Hash: 54117035204A4482E7D5DB12EA9836D7365FB8DBC0F009010EE0747FA4CF78D6AE8745
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CloseCreateHandleObjectSingleThreadWait
                              • String ID:
                              • API String ID: 1118446344-0
                              • Opcode ID: d6fbb27dc71b9bb45a3e03f2c4ca4039059d8645390de1f76c501d957e768064
                              • Instruction ID: f66d544484fc3a7b008fe99be17124468214c8f80cae91bbdbd0259278ff5cdd
                              • Opcode Fuzzy Hash: d6fbb27dc71b9bb45a3e03f2c4ca4039059d8645390de1f76c501d957e768064
                              • Instruction Fuzzy Hash: 7E11F038210B498AFB868B60FC993947362B78D361F418615EC1A923F0DF7C868E8345
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeaveObjectSingleWait
                              • String ID: ..\src\global_state.c$[%s:%d] %s: main thread is waiting for global_state.contexts$wait_for_context_free
                              • API String ID: 501323975-3251086152
                              • Opcode ID: 75c0ce70ca474cdc7d63e01295ab784c1057197f7f3abede72f7fe58ba74c14b
                              • Instruction ID: 87b7a98533aeb2d61614d01219c6eba34cc35b9b093462350c5e8b4f61532cb9
                              • Opcode Fuzzy Hash: 75c0ce70ca474cdc7d63e01295ab784c1057197f7f3abede72f7fe58ba74c14b
                              • Instruction Fuzzy Hash: 3301E835210A8896EAD28F10F8983D4B765F74D794F55C511E95A636B0CF79CB8DC304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,00000000,00000000,00000000,000000018000690E), ref: 000000018000782F
                              • LeaveCriticalSection.KERNEL32(?,?,00000000,00000000,00000000,000000018000690E), ref: 0000000180007861
                                • Part of subcall function 0000000180008020: EnterCriticalSection.KERNEL32 ref: 000000018000809A
                                • Part of subcall function 0000000180008020: LeaveCriticalSection.KERNEL32 ref: 00000001800080B1
                                • Part of subcall function 0000000180008020: EnterCriticalSection.KERNEL32 ref: 00000001800080CF
                                • Part of subcall function 0000000180008020: LeaveCriticalSection.KERNEL32 ref: 00000001800080E7
                                • Part of subcall function 0000000180008020: WaitForSingleObject.KERNEL32 ref: 00000001800080F9
                                • Part of subcall function 0000000180008020: EnterCriticalSection.KERNEL32 ref: 0000000180008106
                              • LeaveCriticalSection.KERNEL32(?,?,00000000,00000000,00000000,000000018000690E), ref: 00000001800079B6
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ObjectSingleWait
                              • String ID: ..\src\bootstrap_requests.c$[%s:%d][ERR] %s: ERROR: no bootstrap server! $get_servers_list_from_bootstrap
                              • API String ID: 1755037574-2486673372
                              • Opcode ID: 999a8019b45ec64d43c4e4f18cceb462fba9670c5e31061901572f508e2cf9f9
                              • Instruction ID: 572254b0c11c9106eb2950b2279cb81425843537f017e7f5e11299b40e301380
                              • Opcode Fuzzy Hash: 999a8019b45ec64d43c4e4f18cceb462fba9670c5e31061901572f508e2cf9f9
                              • Instruction Fuzzy Hash: 2C4157367006488AEB92DF14E8443E8B3A1F79CB95F448125ED8E873A5EF78CA49C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: File$CloseCreateErrorHandleLastSize
                              • String ID:
                              • API String ID: 281206921-0
                              • Opcode ID: a3d20ad20c15e23918d45ba01288cf3366f71431c14937eeb88c7874deafadc6
                              • Instruction ID: 9ee00e559af4ae8c09aa3f7a506bba57cc2e15fc533ec405e3140e287ea3e942
                              • Opcode Fuzzy Hash: a3d20ad20c15e23918d45ba01288cf3366f71431c14937eeb88c7874deafadc6
                              • Instruction Fuzzy Hash: C3318D35208B8886F7929F25A54439D73A5F78AFE0F248126EF4943BE4DF78CA4D8700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), %d ... ) => 0 $[%s:%d] %s: (%p, %d (%s), '%s', ... ) => 0 $__bdnimbus_set_optionv
                              • API String ID: 266293576-1966894916
                              • Opcode ID: 34eebfcdf529f269edc055db5292bd147e61b7b0dd806886553b4dd7cb2f322d
                              • Instruction ID: 61583d5790021653779d152a67f8cc1a9638e6c95872152d4524c4af7a6c918a
                              • Opcode Fuzzy Hash: 34eebfcdf529f269edc055db5292bd147e61b7b0dd806886553b4dd7cb2f322d
                              • Instruction Fuzzy Hash: F0212736204B4886E6A3DB10F8893DD7365F7893A0F54812AFE8A577A5DF38C74D8308
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), %p, ... ) => 0 $[%s:%d][ERR] %s: (%p, %d (%s), %p, ... ) => %d %s$__bdnimbus_set_optionv
                              • API String ID: 266293576-1097658329
                              • Opcode ID: 6bcd5375db991a4f404929a42dcdb4bde30ef80a38ef6c92066f56f0a16044a4
                              • Instruction ID: cc9573ebb344a1c310f2fc099d272aaf92bda924b97941398c6b934287c30f86
                              • Opcode Fuzzy Hash: 6bcd5375db991a4f404929a42dcdb4bde30ef80a38ef6c92066f56f0a16044a4
                              • Instruction Fuzzy Hash: B0212636204B8882E6E3CF05F4457DAB3A9F78D390F50852AFA8A47795DF78C64D8704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,000000018001988F), ref: 00000001800230DF
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,000000018001988F), ref: 00000001800231AB
                                • Part of subcall function 000000018000A660: timeGetTime.WINMM(?,?,00000016,0000000180023104,?,?,?,?,?,000000018001988F), ref: 000000018000A722
                                • Part of subcall function 000000018000A660: InitializeCriticalSection.KERNEL32(?,?,00000016,0000000180023104,?,?,?,?,?,000000018001988F), ref: 000000018000A757
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterInitializeLeaveTimetime
                              • String ID: ..\src\runtime_settings.c$[%s:%d][ERR] %s: create pool failed %d$[%s:%d][WARN] %s: create second pool failed %d (continue without)$runtime_settings_create_pools_nolock
                              • API String ID: 1999974736-2564490013
                              • Opcode ID: b3784d0af378a4bcfebd734ec67364e6e63a8b081f24cdc35edb3ef37b54fd22
                              • Instruction ID: af602f8c2c486dcbea48d00051e5e4a9f773179a94eb64fc5c7f3b157ce3cacc
                              • Opcode Fuzzy Hash: b3784d0af378a4bcfebd734ec67364e6e63a8b081f24cdc35edb3ef37b54fd22
                              • Instruction Fuzzy Hash: 5C215332200B4882F792CF25E8463CA77A5F748B88F448132EA49876A8DF79C75DC744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\push_conn.c$[%s:%d] %s: '%s'$h_id=$prepare_ri
                              • API String ID: 266293576-3497664589
                              • Opcode ID: 0f0582aec2e82975588b0d92df11f3a07ea75f8f6cabd12527be38a494f50f0c
                              • Instruction ID: e578366323b3963eece4ef5c0fb6270cdfb4429010da5e419c5f922787018dd6
                              • Opcode Fuzzy Hash: 0f0582aec2e82975588b0d92df11f3a07ea75f8f6cabd12527be38a494f50f0c
                              • Instruction Fuzzy Hash: 8F216F35600A8886D796CF15F8443D9B7A1F74CB94F848212EF5E573A4EF78C649C700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(?,?,?,00000001802397CD,?,?,?,?,0000000180245983,?,?,00000000,000000018024538E,?,?,?), ref: 000000018024527F
                              • FlsSetValue.KERNEL32(?,?,?,00000001802397CD,?,?,?,?,0000000180245983,?,?,00000000,000000018024538E,?,?,?), ref: 00000001802452B5
                              • FlsSetValue.KERNEL32(?,?,?,00000001802397CD,?,?,?,?,0000000180245983,?,?,00000000,000000018024538E,?,?,?), ref: 00000001802452E2
                              • FlsSetValue.KERNEL32(?,?,?,00000001802397CD,?,?,?,?,0000000180245983,?,?,00000000,000000018024538E,?,?,?), ref: 00000001802452F3
                              • FlsSetValue.KERNEL32(?,?,?,00000001802397CD,?,?,?,?,0000000180245983,?,?,00000000,000000018024538E,?,?,?), ref: 0000000180245304
                              • SetLastError.KERNEL32(?,?,?,00000001802397CD,?,?,?,?,0000000180245983,?,?,00000000,000000018024538E,?,?,?), ref: 000000018024531F
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Value$ErrorLast
                              • String ID:
                              • API String ID: 2506987500-0
                              • Opcode ID: 9f583164f44ff690fa5e6e672e510909bffa6910aeaa3e5a778e9e72501ea637
                              • Instruction ID: c25cf190199965df55b1d30f1c3bd9eefd59afa614a635e980f1d98b3d108bed
                              • Opcode Fuzzy Hash: 9f583164f44ff690fa5e6e672e510909bffa6910aeaa3e5a778e9e72501ea637
                              • Instruction Fuzzy Hash: EC119030304A5842FAD797395ADD3ED22635F4D7B0F06C725AC7647AD7DEE896488700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Thread$CloseCreateErrorFreeHandleLastLibraryResume_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2082702847-0
                              • Opcode ID: 16518c2ce5099810014b9bb4fec56a4780c897c93b7361d9e885c401ac592d7f
                              • Instruction ID: 1aafe6cccef4da3911572311c9e3f865616e9bda0f99f7506b68cfbaefcf588a
                              • Opcode Fuzzy Hash: 16518c2ce5099810014b9bb4fec56a4780c897c93b7361d9e885c401ac592d7f
                              • Instruction Fuzzy Hash: 15117535201F4882FFD69F60A49C3D966B2AB4DBB4F0587249E3A067D5DFB8C65C8740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: File$ErrorLast$CloseCreateDeleteHandleWrite
                              • String ID:
                              • API String ID: 527566810-0
                              • Opcode ID: 93d01b7b42ad8aba496a24ddd242df452c8683dbd39fdc3b8486bf2409ccf091
                              • Instruction ID: a7ea3d4b5eb4b0f2510525a7836d794ad96a194cc9f13974da0ae0209f6c6933
                              • Opcode Fuzzy Hash: 93d01b7b42ad8aba496a24ddd242df452c8683dbd39fdc3b8486bf2409ccf091
                              • Instruction Fuzzy Hash: 0611B135304A8486E7D19F25B84479E6391F78EBE4F088226FE5643BE4CF78C64E8B41
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,000000018000B272), ref: 000000018002342F
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,000000018000B272), ref: 00000001800234DF
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\runtime_settings.c$[%s:%d][WARN] %s: Dropping fallback server '%s'$[%s:%d][WARN] %s: Dropping primary server '%s'$runtime_settings_disable_pool
                              • API String ID: 266293576-3019508685
                              • Opcode ID: 1972c96a3b0b350409bf65c75b1856e108601108305c1db728819998a8401ee1
                              • Instruction ID: 0da31aacbb180e771dfeb006b4034b57f3af5e7da4a12fb3a0444bbfa059aec9
                              • Opcode Fuzzy Hash: 1972c96a3b0b350409bf65c75b1856e108601108305c1db728819998a8401ee1
                              • Instruction Fuzzy Hash: A4214832214B4882EB92CF04E8453D93365F348B98F448226EA5D477A4DFB9C79DC344
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$CreateThread$EnterInitialize
                              • String ID:
                              • API String ID: 3856160661-0
                              • Opcode ID: d904f1ee93490a578cdf5dc06bf2d8df8fbadb9ffc4c387a3cd810ef317960f6
                              • Instruction ID: 1f5614d7916ce66e5acbce3256de060ec7bf0dde78e2f019fd9bd43870c5c5f7
                              • Opcode Fuzzy Hash: d904f1ee93490a578cdf5dc06bf2d8df8fbadb9ffc4c387a3cd810ef317960f6
                              • Instruction Fuzzy Hash: 8031E335504B898AF7D3CF20F8953E97365BB9D345F16D215ED8A612A1DF78938C8300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID: ..\src\api.c$[%s:%d][ERR] %s: (%p, %d (%s), %d ... ) => %d %s$__bdnimbus_set_optionv
                              • API String ID: 2978645861-2152615962
                              • Opcode ID: d7163eb7689da703687f0bd927ebc2e3634607bd170b5bd894254d7c8da87836
                              • Instruction ID: ef9a8150743f62da2b0ee4592be5a6837098ceedc137e120a90da58a90d2ba29
                              • Opcode Fuzzy Hash: d7163eb7689da703687f0bd927ebc2e3634607bd170b5bd894254d7c8da87836
                              • Instruction Fuzzy Hash: 84112B36204A4986E7D3DF04F8943DAB765F78C390F548026EE8A576A0DF78CB8D8704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons$htonlif_nametoindex
                              • String ID: %u.%u.%u.%u%c
                              • API String ID: 2561321223-2006965413
                              • Opcode ID: 53411e93d8350e9484b1ce6c4d6ebe8ab69a485c750d48b380e59efba621b760
                              • Instruction ID: 35b7adf9c890975608c7d92794581267117574bc98f1f0db81dc250ba5802238
                              • Opcode Fuzzy Hash: 53411e93d8350e9484b1ce6c4d6ebe8ab69a485c750d48b380e59efba621b760
                              • Instruction Fuzzy Hash: 3E61F832604B9C86E796CF61E4443EEA391EB8D7C8F86C122FA4947B95DF78C649C704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons
                              • String ID: ..\src\bdnc_conn.c$[%s:%d][ERR] %s: retcode %d | IPv%d$bdnc_conn_connect_to
                              • API String ID: 4207154920-1465590489
                              • Opcode ID: d855e5026fa61797d0f32f41629bda256d34ea699283512ad9cd5d747f4b0a4f
                              • Instruction ID: fe012ee93217bb7339b19ce4cf79f46d7e3168de4d79c7e9eac180a8c5aa2049
                              • Opcode Fuzzy Hash: d855e5026fa61797d0f32f41629bda256d34ea699283512ad9cd5d747f4b0a4f
                              • Instruction Fuzzy Hash: F2510C32A14B8893E7969B34A6013F96361F769784F05A316EF8916653EF74E2E8C340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FormatMessageA.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000018001DC57), ref: 000000018001F03B
                              • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000018001DC57), ref: 000000018001F09E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: FormatFreeLocalMessage
                              • String ID: ..\src\win\win_error.c$[%s:%d][WARN] %s: unmapped error code %u (%s) defaults to %u (%s)$map_system_error
                              • API String ID: 1427518018-1192454891
                              • Opcode ID: 8a2278eeb5c41d9edc9162d035036487058ef662e450edacb6f0be5de45b7874
                              • Instruction ID: 5080f43d37f40177c093e2649b39a717a9e33135c5a0f7f27bc878ec9d5738f0
                              • Opcode Fuzzy Hash: 8a2278eeb5c41d9edc9162d035036487058ef662e450edacb6f0be5de45b7874
                              • Instruction Fuzzy Hash: ED314D72708B4487E796CB09F4943A977A6F78C784F448136EB4943799DF38C659CB04
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterErrorLastLeaveStartupThread
                              • String ID: ..\src\win\dll_main.c$[%s:%d][ERR] %s: [LITTLE_DNS_CREATE FAILED] WSAStartup : %d ( %s )$wsa_init
                              • API String ID: 2492808808-2025973463
                              • Opcode ID: d704506496ccc184f6d933dd0b7d2340d7e173b0604b8dc33ef4e40f5a0d33be
                              • Instruction ID: 976fb2669a3ada6986766cdd128c2b71c0e88becb05099fa721b4a1a6ca9d81a
                              • Opcode Fuzzy Hash: d704506496ccc184f6d933dd0b7d2340d7e173b0604b8dc33ef4e40f5a0d33be
                              • Instruction Fuzzy Hash: 97116535705A8985FBE29B20F4593EE73A1F78C784F804026A94E47796DF7DC609C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32 ref: 0000000180018D8E
                              • LeaveCriticalSection.KERNEL32 ref: 0000000180018DB0
                                • Part of subcall function 0000000180023510: EnterCriticalSection.KERNEL32(?,?,00000000,0000000180019A64), ref: 0000000180023529
                                • Part of subcall function 0000000180023510: LeaveCriticalSection.KERNEL32(?,?,00000000,0000000180019A64), ref: 0000000180023544
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\user_context.c$[%s:%d] %s: same local cloud as before$user_context_make_pool
                              • API String ID: 3168844106-3378153947
                              • Opcode ID: f27f08862ed75a11f60147ecb178d8ad76df11be8b65570a4d5faecc6f6d5d29
                              • Instruction ID: cd8fdc4f6830065916ce87a711c8cfb564820c7dfa47cd6ecbbcfe718334fcbc
                              • Opcode Fuzzy Hash: f27f08862ed75a11f60147ecb178d8ad76df11be8b65570a4d5faecc6f6d5d29
                              • Instruction Fuzzy Hash: A141A231304A8C86FBF79B20E4413DA63A1FB9CB94F449121BA6E476D5DF69C74C8700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CreateCriticalEventInitializeSection
                              • String ID:
                              • API String ID: 2948115387-0
                              • Opcode ID: 92fbf76cb88296915da757d29c98939f2ddd2a17b26dd985f5833f2e2b40f7fd
                              • Instruction ID: be7e0f58a337ead562f9325772191238a007a2055be4571096901461ac4615bd
                              • Opcode Fuzzy Hash: 92fbf76cb88296915da757d29c98939f2ddd2a17b26dd985f5833f2e2b40f7fd
                              • Instruction Fuzzy Hash: D1418C36300B0482EB86DF25E45439A73A5FB8DB98F488225EF5D47799DF38C659C704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorLastclosesocketconnectgetsockoptioctlsocketsocket
                              • String ID:
                              • API String ID: 4130793707-0
                              • Opcode ID: e98fdf225a7e3dd375d57c8ffba94f9efe440dd21e9565f8f829ff09d4fda712
                              • Instruction ID: 82d4cb1e292c85e3eb848b6054ef754ca3f48c26c769ccadaa5c312ba9f5046a
                              • Opcode Fuzzy Hash: e98fdf225a7e3dd375d57c8ffba94f9efe440dd21e9565f8f829ff09d4fda712
                              • Instruction Fuzzy Hash: 6D31B436340A9886F7925F65E4843A9A355A74DBE8F048130EF5D877E4EEB8C6C98708
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\rpc\rpc_server.c$[%s:%d] %s: uc:: %p uninit_cb %p, uninit_cb_ctx: %p$bdnc_rpc_uninit
                              • API String ID: 3168844106-3466849464
                              • Opcode ID: 4b274b643260cd595935a2272eb26db8ee367b5548dfd8a13621337052c13f0a
                              • Instruction ID: ae5cc7343d858c8fcfdd9a89bd2c98f29dce470cb5912bdbd501eded6ac714dd
                              • Opcode Fuzzy Hash: 4b274b643260cd595935a2272eb26db8ee367b5548dfd8a13621337052c13f0a
                              • Instruction Fuzzy Hash: 19316E72204B88C6EB96DF11E4443AEB7B4F789B84F50811AEB8D47B95CF79C658CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CloseCreateEnterEventHandleLeaveObjectSingleWait
                              • String ID:
                              • API String ID: 2040285216-0
                              • Opcode ID: 45cbce1aac5454b4c528fb41922c458fc7f06567335373b44a584a6670801366
                              • Instruction ID: 4b8ddacb18f41e7bd915431af2756e142325291e67d16ff2178cc58486baa7cf
                              • Opcode Fuzzy Hash: 45cbce1aac5454b4c528fb41922c458fc7f06567335373b44a584a6670801366
                              • Instruction Fuzzy Hash: 2A31F835201F4886EB969F65F8A03A933A5BB8CB94F15C025DD5E873A1DF38CA9DC350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,0000000180006903), ref: 0000000180007739
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,0000000180006903), ref: 0000000180007768
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\bootstrap_requests.c$[%s:%d] %s: using '%s' for bootstrap$get_server_in_use
                              • API String ID: 3168844106-2759011966
                              • Opcode ID: 1dbde184db15ae1564fbd4efa6912e340ed183488bff0532649f7c6abad01482
                              • Instruction ID: b228d881ab95364eee0434aefafa85cab198e6d6128ad548623a57b8935f56a8
                              • Opcode Fuzzy Hash: 1dbde184db15ae1564fbd4efa6912e340ed183488bff0532649f7c6abad01482
                              • Instruction Fuzzy Hash: 0A214835700B4986EAD2DB15A8453E973A1BB9D7C0F889521FE8E477A2DE3CC61DC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\conn_pool.c$[%s:%d] %s: closed %d conns$conn_pool_flush
                              • API String ID: 3168844106-2818039318
                              • Opcode ID: c30361e4588053d347f7da0ee1f4b73222ce94e47ff0c482c0ec520e01931182
                              • Instruction ID: 795a0993610d39dcc86ed79424fb5c34b8b80a6376800435f3339eb45ffcb57d
                              • Opcode Fuzzy Hash: c30361e4588053d347f7da0ee1f4b73222ce94e47ff0c482c0ec520e01931182
                              • Instruction Fuzzy Hash: 1E211B36204B8486EB92DF16E450399B7A5F34CF94F488121EF4D47729CF78C659C784
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32 ref: 000000018000D199
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThreadValue
                              • String ID: ..\src\global_state.c$[%s:%d] %s: defer:%p$[%s:%d][ERR] %s: no tls value$add_deferred2_cb
                              • API String ID: 938596877-2559096411
                              • Opcode ID: 2f8d48d296023333bbe0a4ea6773dec48edcc17d579cb20ed922ae2a79e95a00
                              • Instruction ID: d58e17015753ad9314fdceabc259c09050d6ae1ff07f16561ec3783be693913f
                              • Opcode Fuzzy Hash: 2f8d48d296023333bbe0a4ea6773dec48edcc17d579cb20ed922ae2a79e95a00
                              • Instruction Fuzzy Hash: 5B215936204B4885E792CF52F44439AB7A8F78CBC0F59812AEA8C47B65CF79C669C744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: _set_statfp
                              • String ID:
                              • API String ID: 1156100317-0
                              • Opcode ID: 69d38c35bd33e64192705e47d806ebaffe6519085bb8d16871af39b095092657
                              • Instruction ID: a47e8a96681cae208dd7e58e20b9541c68d7121ab1c0bd7d305ff87d73d86bf7
                              • Opcode Fuzzy Hash: 69d38c35bd33e64192705e47d806ebaffe6519085bb8d16871af39b095092657
                              • Instruction Fuzzy Hash: 2611A772A10A1AC1F6E61168FCCE3F910436B5C370F05C624BE67472DB8EE68E49870C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\conn_pool.c$[%s:%d] %s: test request status: %d$test_req_cb
                              • API String ID: 3168844106-348288455
                              • Opcode ID: 788f56574136d824df9f8acd5da6c3e54cb4ac2d83d8257f79bcaf65f0849bc8
                              • Instruction ID: 55ad0f9963340c6fc357a40262f2ddbb39df0fdbaa8febdf21ce3d9b5a943f02
                              • Opcode Fuzzy Hash: 788f56574136d824df9f8acd5da6c3e54cb4ac2d83d8257f79bcaf65f0849bc8
                              • Instruction Fuzzy Hash: AE21D172604B8886E7A2CF20E8003D9B3A5F748BD4F148521FF8587BA5DF78CB598B45
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\api.c$[%s:%d][ERR] %s: (%p, %d (%s), '%s', ... ) => %d %s$__bdnimbus_set_optionv
                              • API String ID: 3168844106-3420288915
                              • Opcode ID: 25ddfb83e29ce44af68a9fc84dd7b981b9875d78a8293f65dd1941c097e4ea35
                              • Instruction ID: fd8031424561f2a50685e5724edb69696d366670552c7967d0d0b846752dca86
                              • Opcode Fuzzy Hash: 25ddfb83e29ce44af68a9fc84dd7b981b9875d78a8293f65dd1941c097e4ea35
                              • Instruction Fuzzy Hash: CD113036304B4882E6E3DB45B4953DAB3A9B78D3A0F188416BE4A47795DF79C78D8700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32 ref: 000000018000D0A0
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThreadValue
                              • String ID: ..\src\global_state.c$[%s:%d] %s: defer:%p$[%s:%d][ERR] %s: no tls value$add_deferred_cb
                              • API String ID: 938596877-285705756
                              • Opcode ID: 72aaddcbab316d0e23d5338872f0a7bdb38fc5ef0cb08674e4ea1343df58576a
                              • Instruction ID: c8a8ff3a8bcd7d6cfe73623ca6607efb015f8ad1120208db7c37881ca87feb6e
                              • Opcode Fuzzy Hash: 72aaddcbab316d0e23d5338872f0a7bdb38fc5ef0cb08674e4ea1343df58576a
                              • Instruction Fuzzy Hash: CF214772205F4895EB92DF01F84439977A5F78CB80F48C52AEA8C87765DFB8C668C744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FlsGetValue.KERNEL32(?,?,?,000000018024324B,?,?,00000000,00000001802434E6,?,?,?,?,?,000000018022F9A3), ref: 0000000180245357
                              • FlsSetValue.KERNEL32(?,?,?,000000018024324B,?,?,00000000,00000001802434E6,?,?,?,?,?,000000018022F9A3), ref: 0000000180245376
                              • FlsSetValue.KERNEL32(?,?,?,000000018024324B,?,?,00000000,00000001802434E6,?,?,?,?,?,000000018022F9A3), ref: 000000018024539E
                              • FlsSetValue.KERNEL32(?,?,?,000000018024324B,?,?,00000000,00000001802434E6,?,?,?,?,?,000000018022F9A3), ref: 00000001802453AF
                              • FlsSetValue.KERNEL32(?,?,?,000000018024324B,?,?,00000000,00000001802434E6,?,?,?,?,?,000000018022F9A3), ref: 00000001802453C0
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: b7a2a8410df512859f03416aeffe42ceb84a6c54b6a0ccb28e37e5694552d66f
                              • Instruction ID: 86f3b37fc4dbba8f65f1812321c188053e0cc066a773b606751227958da6a6bc
                              • Opcode Fuzzy Hash: b7a2a8410df512859f03416aeffe42ceb84a6c54b6a0ccb28e37e5694552d66f
                              • Instruction Fuzzy Hash: B011D330704B1841FADB972959D93ED22A35F8C7F0F0AC36468B946AD7DEE8D6498300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EventLeave$Enter
                              • String ID:
                              • API String ID: 1122070342-0
                              • Opcode ID: 0decf1d0251684fd8282ad892097de0c6d370d480a779acd307e2e40a4bb68a0
                              • Instruction ID: a22baeb204cd0895b1052237d962a01552b22a454fe05fdf9137959a55f7555e
                              • Opcode Fuzzy Hash: 0decf1d0251684fd8282ad892097de0c6d370d480a779acd307e2e40a4bb68a0
                              • Instruction Fuzzy Hash: 60216D76615A48C2EB968F61D84436C73A1FB89F99F089021EA0A47694DF39CEDAC700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\ssl\ssl_ctx.c$[%s:%d] %s: SSL global uninit done$ssl_global_uninit
                              • API String ID: 3168844106-4231627440
                              • Opcode ID: e7cea2bff40ef3230d41f8516d995d73bd1a1d8f8f5d877c38df8ae32a39a22f
                              • Instruction ID: 96e9cd532eed0d4eaaef8dcce5a93d363e65d5a741b261ac1fba4fe924452841
                              • Opcode Fuzzy Hash: e7cea2bff40ef3230d41f8516d995d73bd1a1d8f8f5d877c38df8ae32a39a22f
                              • Instruction Fuzzy Hash: 9C215834301A5888FBD7EB21F8553E173AABB4CBC5F54C116AD4A426A1CF79878CC340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), '%s', ... ) => 0 $__bdnimbus_set_optionv
                              • API String ID: 3168844106-3113967066
                              • Opcode ID: 8a33aeb8260c3deee69b2dbd8f5f921939c60bacd7aa7a8f9c175d9843a9132e
                              • Instruction ID: 5b4036d32402e0838f070e41bf3359d168dc1da95eb6bd46d079f05c8639675f
                              • Opcode Fuzzy Hash: 8a33aeb8260c3deee69b2dbd8f5f921939c60bacd7aa7a8f9c175d9843a9132e
                              • Instruction Fuzzy Hash: 36012936200B4886E6E3DB10F8983D97365B78D3A5F948016FE8A576A5DF38C78DC304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), '%s', ... ) => 0 $__bdnimbus_set_optionv
                              • API String ID: 3168844106-3113967066
                              • Opcode ID: ba6bb5018df3efbfeb9880a7fec7239d659dfb3dc0786f9bd16111840b9382ce
                              • Instruction ID: 693b2808d39fdda9ddbe9e3e90a8f201a7e06ccbd0e148f88b5272e47cec5846
                              • Opcode Fuzzy Hash: ba6bb5018df3efbfeb9880a7fec7239d659dfb3dc0786f9bd16111840b9382ce
                              • Instruction Fuzzy Hash: 8D012936200B4886E6E3DB10F8943D97365B78D3A5F948516FE8A576A5DF38C78DC304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0000000180023510: EnterCriticalSection.KERNEL32(?,?,00000000,0000000180019A64), ref: 0000000180023529
                                • Part of subcall function 0000000180023510: LeaveCriticalSection.KERNEL32(?,?,00000000,0000000180019A64), ref: 0000000180023544
                                • Part of subcall function 00000001800230C0: EnterCriticalSection.KERNEL32(?,?,?,?,?,000000018001988F), ref: 00000001800230DF
                                • Part of subcall function 00000001800230C0: LeaveCriticalSection.KERNEL32(?,?,?,?,?,000000018001988F), ref: 00000001800231AB
                              • EnterCriticalSection.KERNEL32 ref: 000000018000CCDD
                              • LeaveCriticalSection.KERNEL32 ref: 000000018000CD6E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\global_state.c$[%s:%d] %s: new runtime_settings: %p | old: %p$set_runtime_configuration
                              • API String ID: 3168844106-926155798
                              • Opcode ID: ae87472ef7f049c07e4db9ee48789db4c451a54f15c44e8c38a3ebdfbe86e4b6
                              • Instruction ID: c6f73a34b41ee7b9542861018fb298e76f288c9d628ad152982f306bafa4115e
                              • Opcode Fuzzy Hash: ae87472ef7f049c07e4db9ee48789db4c451a54f15c44e8c38a3ebdfbe86e4b6
                              • Instruction Fuzzy Hash: AC11C2B4210B0984EAC2EB51F8953D973A4BB8C780F55D526AC5E53761EE3CC75CC350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\bootstrap_requests.c$[%s:%d] %s: using '%s' for bootstrap$get_server_in_use
                              • API String ID: 3168844106-2759011966
                              • Opcode ID: 4a061f32318d102704a72ba4af49c11e84d15e33e847691cf68d6d16f2f27f2a
                              • Instruction ID: 5fd0539af7aaf33631f86e75cb245d35ef348e465ef4ae1e8ae341bf5e372193
                              • Opcode Fuzzy Hash: 4a061f32318d102704a72ba4af49c11e84d15e33e847691cf68d6d16f2f27f2a
                              • Instruction Fuzzy Hash: 5D018835700A4A82EAD3DF20E8553E573A0BB5C781F488432AE4E066A2EE2CC35DC304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), '%s', ... ) => 0 $__bdnimbus_set_optionv
                              • API String ID: 3168844106-3113967066
                              • Opcode ID: e1780a604520911bfc75e7f7e09f083ce212bc6189ae514f81ab2b90515fa2f1
                              • Instruction ID: 0341176769dab752b3e04aff50f8778375d4b74893e613b3ae60a8a28fb44a9c
                              • Opcode Fuzzy Hash: e1780a604520911bfc75e7f7e09f083ce212bc6189ae514f81ab2b90515fa2f1
                              • Instruction Fuzzy Hash: CF012536200B4886E6A3DB10F8983D97365B78A3A5F848016FE8A577A5DE38C78DC304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\api.c$[%s:%d] %s: (%p, %d (%s), %d ... ) => 0 $__bdnimbus_set_optionv
                              • API String ID: 266293576-4040927558
                              • Opcode ID: 8dba8f743c2cd7c3bd27af379d033068daf06d24a557416dd2a34c924912a3f6
                              • Instruction ID: b16ca7db4fb2f36a3bd13c09d439c5c0c0e2d980696d3696a1cbbf1aa5e6a954
                              • Opcode Fuzzy Hash: 8dba8f743c2cd7c3bd27af379d033068daf06d24a557416dd2a34c924912a3f6
                              • Instruction Fuzzy Hash: 07015E36214A4886E6D3DF10F8943DA7725F78D794F408016EE8B166A5DF38C78DD704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: ..\src\upload\upload.c$[%s:%d] %s: calling user_context_signal_uninit$upload_uninit_context
                              • API String ID: 3168844106-3983560504
                              • Opcode ID: 5afb68360c52635bd743f949f41229abb65429b2f30444eabe8834a6c7c08173
                              • Instruction ID: 5302713692c8562e03ac7c0eb654555d3d09c5b0a255550fa6b85023ac3b1ab3
                              • Opcode Fuzzy Hash: 5afb68360c52635bd743f949f41229abb65429b2f30444eabe8834a6c7c08173
                              • Instruction Fuzzy Hash: 7DF08C34200A8895EBC39B01F9983EAA365BB4D7D4F44C421AE49076A2DFA8C74DC304
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalObjectSectionSingleWait$CloseEnterHandleLeave
                              • String ID:
                              • API String ID: 1472654478-0
                              • Opcode ID: f98f9037a1e57bdeef089646d29685b89a1258416e2968abd0640d4b4f883a84
                              • Instruction ID: e699344cdf16340ead0ab4c0fe4fcf2034eb00f8c0dc9b59fe482f430d2aee4b
                              • Opcode Fuzzy Hash: f98f9037a1e57bdeef089646d29685b89a1258416e2968abd0640d4b4f883a84
                              • Instruction Fuzzy Hash: 9FF0EC39210A088AFBC69B15FC997D43321B79E772F41C300EC2A963F0DF289A8D8305
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CurrentThread
                              • String ID: ..\src\dns_client.c$[%s:%d] %s: %d$get_randomize_option
                              • API String ID: 266293576-3551041418
                              • Opcode ID: 2e6f64e3cb6effd3f51fa02ad0638c376460dff5ea1e078bf735267d762e3cbb
                              • Instruction ID: 533db360eb9c5ff80f261fab3edd5af8d3affda2ae6acefe486faf22b4363c4b
                              • Opcode Fuzzy Hash: 2e6f64e3cb6effd3f51fa02ad0638c376460dff5ea1e078bf735267d762e3cbb
                              • Instruction Fuzzy Hash: 01F01539220A8E96EB92DF10F8997C87321F35C356F409512ED0A52274EE79875DC758
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: UTF-16LEUNICODE$UTF-8$ccs
                              • API String ID: 3215553584-1196891531
                              • Opcode ID: 15c53ed66eed965ca6c2dc6a4d6ba78aac988be83aa6059c1a94fbdbec60fde7
                              • Instruction ID: 4cb0ca05417a9c82e46e229f71b77368ce365810b6b63f5cd012f9736271fd65
                              • Opcode Fuzzy Hash: 15c53ed66eed965ca6c2dc6a4d6ba78aac988be83aa6059c1a94fbdbec60fde7
                              • Instruction Fuzzy Hash: 9381DF72600E1885FBE78F29C19C3E826B2B319B88F57D005DA06576A5DFA9CB4D8703
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThread
                              • String ID: ..\src\rpc\rpc_server.c$[%s:%d] %s: deserialize_bdnimbus_upload_file_inline failed$bdnc_rpc_upload_file
                              • API String ID: 2351996187-1210292844
                              • Opcode ID: bc0b0475c7717a3f91001ac3ef0de327ca8f26b94db0e245b70005c4efb894a8
                              • Instruction ID: 06a63cfa291acc41b27b0526fc9b6d3231e4f4c3bfc479e02f2a95442617c7c4
                              • Opcode Fuzzy Hash: bc0b0475c7717a3f91001ac3ef0de327ca8f26b94db0e245b70005c4efb894a8
                              • Instruction Fuzzy Hash: 55919B76B04B889AEB52DFA1E4507EE37B4F359B88F418215EE092BB45DF34D269C340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterLeaveThread
                              • String ID: ..\src\rpc\rpc_server.c$[%s:%d] %s: deserialize_bdnimbus_upload_gen_inline failed$bdnc_rpc_upload_gen
                              • API String ID: 2351996187-2168660724
                              • Opcode ID: 06c3ebbf208fc813c83d2f6005ad9efdbc64ca1b973a46240bad44ffd553c89f
                              • Instruction ID: 27335c92925b1bbbf9020a3ea56e958da044f0759986471e79a56d56d122a06d
                              • Opcode Fuzzy Hash: 06c3ebbf208fc813c83d2f6005ad9efdbc64ca1b973a46240bad44ffd553c89f
                              • Instruction Fuzzy Hash: BB913972A04B889AEB52DF61E4507DE33B5F349B88F418216EE4D1BB45DF34D669C340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterEventLeave
                              • String ID: /_ServerStatus
                              • API String ID: 3094578987-1363190917
                              • Opcode ID: 29a76cc0515ce3dddeb5c8969c67fe73fbe133084c542fd9a1b267b199e7b7d3
                              • Instruction ID: 9d3696cb985281fa855691415d401aa2e86bb96b8c8f4e95b72f76114873efc9
                              • Opcode Fuzzy Hash: 29a76cc0515ce3dddeb5c8969c67fe73fbe133084c542fd9a1b267b199e7b7d3
                              • Instruction Fuzzy Hash: 0D518D32200A88CAE796DF25E8447E977A1F78CB89F1D8031EE4A57769CF34CA49D700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorLast_fread_nolock
                              • String ID: ..\src\upload\upload.c$[%s:%d] %s: finished$upload_write_cb
                              • API String ID: 2193046044-2943853338
                              • Opcode ID: 1bd6f5bc475f19adba1666210a2f60dc78c20aa4d017a727306a608c8bb36414
                              • Instruction ID: b12a8a1a430e0e96d2296149c35560d84832282d807004a06b225f4bededbf50
                              • Opcode Fuzzy Hash: 1bd6f5bc475f19adba1666210a2f60dc78c20aa4d017a727306a608c8bb36414
                              • Instruction Fuzzy Hash: B841AF32301E4886EBA29B96E5803EA23A1F78C7D8F418135EF5D53B95EF74C6688704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: OPENSSL_Applink$OPENSSL_Uplink(%p,%02X):
                              • API String ID: 1646373207-2538489275
                              • Opcode ID: cf76ad8af8b8aa93f197532fcf8e1762a47f50932cccc9e398c88686fa17c923
                              • Instruction ID: 487988acc7e193bad17f219eccaf2330b15d1d54057c3acfe8ce19506f3e366c
                              • Opcode Fuzzy Hash: cf76ad8af8b8aa93f197532fcf8e1762a47f50932cccc9e398c88686fa17c923
                              • Instruction Fuzzy Hash: 5F514731905F48C5E7928F29E8643A473A1F75C778F45E706EAA9122E5EF78D389C700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons
                              • String ID: ..\src\push_conn.c$[%s:%d] %s: pc = %p, push_id %s, host: %s, port : %hu$push_connection_search
                              • API String ID: 4207154920-2643372058
                              • Opcode ID: ceace81ff43f0cfa5b89c5349cee157d8402080e34e9870918fd7df3a6e2a4c1
                              • Instruction ID: 2514ca7334aab2fa6c8bdee46ddde592edab9097aa6b9c4af34de514032d05ed
                              • Opcode Fuzzy Hash: ceace81ff43f0cfa5b89c5349cee157d8402080e34e9870918fd7df3a6e2a4c1
                              • Instruction Fuzzy Hash: 3521917160478C80EBD35F22A4803EA77A5F348BC4F488126FF89437A9DEB8CA59C700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterEventLeave
                              • String ID: uuid
                              • API String ID: 3094578987-3514781862
                              • Opcode ID: 2869479280abbe5ba55ccd72236d0f118442b63c67f1d8a737fa671eb3e9a4b8
                              • Instruction ID: 3726c9dd8a9b249ee703ed9eec6ba6d7c5ef51765c02eae076e2314d6a81b94b
                              • Opcode Fuzzy Hash: 2869479280abbe5ba55ccd72236d0f118442b63c67f1d8a737fa671eb3e9a4b8
                              • Instruction Fuzzy Hash: BE318931201B4885EAE2DB25E4653D933A1FB4CB94F448221EE9D07792DF78CA09C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: closesocket$ioctlsocket
                              • String ID: fcntl(%d, F_GETFL)
                              • API String ID: 1937125420-1431147513
                              • Opcode ID: 33a234d68136742b4145d0c4f6d7b203b08b3b5dbafa5e13e41a4da49908a5d6
                              • Instruction ID: c2109fc3fd483216e22ae579cea1f00feda910552a381b65202e912095569648
                              • Opcode Fuzzy Hash: 33a234d68136742b4145d0c4f6d7b203b08b3b5dbafa5e13e41a4da49908a5d6
                              • Instruction Fuzzy Hash: 26119432610E8482D7A19F75E8943987362E749BF8F149301FA764B7E8DF74C599C700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CreateThread
                              • String ID: ..\src\win\net_awareness.c$[%s:%d][ERR] %s: failed to create network_awareness thread$network_awareness_create_th
                              • API String ID: 2422867632-2603990020
                              • Opcode ID: e891083bcac75546d63e7c1c2e86a17605732579f68ae65e68ccd66e2aceae60
                              • Instruction ID: 5691c1647aec7589dd56db06e68458023a44fe92e65cf115a85bed215ecf7188
                              • Opcode Fuzzy Hash: e891083bcac75546d63e7c1c2e86a17605732579f68ae65e68ccd66e2aceae60
                              • Instruction Fuzzy Hash: C8018F7020170841FFD79B20A4563EA6395AB4C795F988039BD8E46391FF7CC35C8348
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateThread.KERNEL32 ref: 000000018002634B
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSectionThread$CreateCurrentEnterLeave
                              • String ID: ..\src\win\net_awareness.c$[%s:%d][ERR] %s: failed to create network_awareness thread$network_awareness_create_th
                              • API String ID: 1012222349-2603990020
                              • Opcode ID: 2c148ef70ba3913e07cd6a4c53cd2bc1b6b9cf92f60995e14851d85e7f82f741
                              • Instruction ID: e678413c495a60392eece61099325daa3caaafa476602e9586cb111eccbafe9c
                              • Opcode Fuzzy Hash: 2c148ef70ba3913e07cd6a4c53cd2bc1b6b9cf92f60995e14851d85e7f82f741
                              • Instruction Fuzzy Hash: FDF067B5601B0881FB928B20E40A3D62394A70C394F884126B98D477A0EF7CC39CC748
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CleanupCurrentEnterLeaveThread
                              • String ID: ..\src\global_state.c$[%s:%d] %s: max contexts: %d$global_state_uninit_nolock
                              • API String ID: 1588925717-2876554725
                              • Opcode ID: 12d778b7b55d83f0f1f9e86a46daa3854674e63b9d536350ecd4bed721a7efb2
                              • Instruction ID: c1ea444a4ceb6cabd092afe48156af485b9e74938327c445aa6633b684d85d0d
                              • Opcode Fuzzy Hash: 12d778b7b55d83f0f1f9e86a46daa3854674e63b9d536350ecd4bed721a7efb2
                              • Instruction Fuzzy Hash: 0CF039B5A01B0EC6F7E66B11B84D7D433A5B34D389F808112E80A032A1DEBD838CCB49
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InitSecurityInterfaceA.SECUR32 ref: 0000000180029554
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CurrentEnterInitInterfaceLeaveSecurityThread
                              • String ID: ..\src\win\proxy_auth_sspi.c$[%s:%d] %s: sspi_fcn: %p$mech_sspi_global_init
                              • API String ID: 4088951990-3800096021
                              • Opcode ID: 6313d900ae708462f74c3dfedc8b8304d90ef00413557a358aad2c9f998d757b
                              • Instruction ID: 0555ff358264ebf01caaee1b5ec352f38bb3e38f07220c584fccb7b0e248e63b
                              • Opcode Fuzzy Hash: 6313d900ae708462f74c3dfedc8b8304d90ef00413557a358aad2c9f998d757b
                              • Instruction Fuzzy Hash: F2E0EC75605B4981F692AB40F40B7C537A6BB5C344F408166A58D07766EFBDC31DCB44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID:
                              • API String ID: 2978645861-0
                              • Opcode ID: c83de9d3dba140588c0c6fcc39651d55cdd8065b9784165bb7670c7273cf5919
                              • Instruction ID: e5cb3ffc411dcef483e0cf1edcca52ff18fb2d10796c112ed105cf3b6adde431
                              • Opcode Fuzzy Hash: c83de9d3dba140588c0c6fcc39651d55cdd8065b9784165bb7670c7273cf5919
                              • Instruction Fuzzy Hash: 35113436210F4882EB91CF21F88439973A4F34CB84F498412EE8A837A4CF79CA9DC740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: getaddrinfohtons
                              • String ID:
                              • API String ID: 1484439025-0
                              • Opcode ID: 57954d870889008c809453f293f23d4166478da08301828321d14d8bd1b28f9f
                              • Instruction ID: 2380cd41e6dc4490564ff52e2c6584245b849384f9dfaffe19a7d1b369c71104
                              • Opcode Fuzzy Hash: 57954d870889008c809453f293f23d4166478da08301828321d14d8bd1b28f9f
                              • Instruction Fuzzy Hash: 60A17B36A00A888AFBB68F61D5803FD23A0F74C78CF26C119EE4956795DF74C698C709
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: freeaddrinfogetaddrinfo$htons
                              • String ID:
                              • API String ID: 2268499712-0
                              • Opcode ID: 8f0bf30cf846410c28a52d9b2b01f32249ca06e1f610130f4e9ed60cc2a33c04
                              • Instruction ID: 829fca35fb16e5c3e49c30a116161fe24adeb8683a5a1f3d45ee309294b66405
                              • Opcode Fuzzy Hash: 8f0bf30cf846410c28a52d9b2b01f32249ca06e1f610130f4e9ed60cc2a33c04
                              • Instruction Fuzzy Hash: 90918E32604A8CCAFBA68F21D4843ED33A0F70D79CF16D156EE4956685DF38CA98C749
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$_get_daylight
                              • String ID:
                              • API String ID: 72036449-0
                              • Opcode ID: cc5e7142a5f7dc61bb8e0efa7752c2a2cdd5d242e459fbdcab9f2bc3caa73ad7
                              • Instruction ID: 4d761994ffb550e847763efdb7f36b724c9569535bdb12eaa27dcb7dd8aea93c
                              • Opcode Fuzzy Hash: cc5e7142a5f7dc61bb8e0efa7752c2a2cdd5d242e459fbdcab9f2bc3caa73ad7
                              • Instruction Fuzzy Hash: 8051D47250170C86F7EF4A28900D3F9A793EB4C714F1BD8269A415F2F5CAECCA499762
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 0000000180047E3D
                              • LeaveCriticalSection.KERNEL32(?,?,0000000C,000000018000E422,?,?,?,?,?,?,000000018000CC0F), ref: 0000000180047E5C
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID:
                              • API String ID: 3168844106-0
                              • Opcode ID: 19d0a7b6eca74f8681613015e494f482a39d1d1cfec4c0c8fd9c399c43e20059
                              • Instruction ID: 604945c18a064e28c8ad0c17273b9113ebe387e2c8a11a2387751254b52cdb58
                              • Opcode Fuzzy Hash: 19d0a7b6eca74f8681613015e494f482a39d1d1cfec4c0c8fd9c399c43e20059
                              • Instruction Fuzzy Hash: C7513C36200A4886EB96DF22D4903AD73A0FB8CF88F59C421EF4957765CF34DAA9D344
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalEnterSection
                              • String ID: ..\src\api.c$[%s:%d][ERR] %s: (%p, %d (%s), %d ... ) => %d %s$__bdnimbus_set_optionv
                              • API String ID: 1904992153-2152615962
                              • Opcode ID: 8610e4e03c6d83c324d98e0b99bc6198c807864057f7ee92bc738eddbcce4e2a
                              • Instruction ID: b5c8ec6da032d52be6e709f660efc047ca4b8da42e6cabc4e57b6637ebfe0299
                              • Opcode Fuzzy Hash: 8610e4e03c6d83c324d98e0b99bc6198c807864057f7ee92bc738eddbcce4e2a
                              • Instruction Fuzzy Hash: E0011E36304B8886E7A2CF04F4543DAB7A9FB89394F44412ABA9A57794DF78C689C704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,00000001800482F9), ref: 0000000180018B61
                                • Part of subcall function 000000018002B690: EnterCriticalSection.KERNEL32 ref: 000000018002B6C8
                                • Part of subcall function 000000018002B690: GetCurrentThreadId.KERNEL32 ref: 000000018002B70E
                                • Part of subcall function 000000018002B690: LeaveCriticalSection.KERNEL32 ref: 000000018002B75D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Enter$CurrentLeaveThread
                              • String ID: ..\src\user_context.c$[%s:%d] %s: UC_SIGNAL_UNINIT %p$user_context_signal_uninit
                              • API String ID: 1861736228-2209794226
                              • Opcode ID: cab9b0d42a23c3fe59efebb4fa123389312e3bb0e2d8e8cbe1923be8117f0c06
                              • Instruction ID: b008b70c0d46d649b0d53aa261d5bf5c07b99d196cc2c253182b2850198001e8
                              • Opcode Fuzzy Hash: cab9b0d42a23c3fe59efebb4fa123389312e3bb0e2d8e8cbe1923be8117f0c06
                              • Instruction Fuzzy Hash: E1018176314A0882E7928F15E4457D93361FB48784F808421EA4957A65EFBACB59CB44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalEventSection$EnterLeave
                              • String ID:
                              • API String ID: 2034477713-0
                              • Opcode ID: 7d1a8cd57f3f381c6fe34930b3f38750209621116fbb4b02d976b0097202fce8
                              • Instruction ID: aa529324dc3aaf9350a7520cdd4860ff01e20a29c42bb100a171e8990e638f61
                              • Opcode Fuzzy Hash: 7d1a8cd57f3f381c6fe34930b3f38750209621116fbb4b02d976b0097202fce8
                              • Instruction Fuzzy Hash: 99F03036515908C3FBD78F22D8583A83361FB4AB49F445010EA07465A4DF7ACACEC704
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,00000000,00000001800021C4), ref: 000000018000245D
                              • LeaveCriticalSection.KERNEL32(?,?,00000000,00000001800021C4), ref: 000000018000246C
                              • DeleteCriticalSection.KERNEL32(?,?,00000000,00000001800021C4), ref: 0000000180002479
                              • CloseHandle.KERNEL32(?,?,00000000,00000001800021C4), ref: 0000000180002483
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$CloseDeleteEnterHandleLeave
                              • String ID:
                              • API String ID: 3102160386-0
                              • Opcode ID: d3066824e62218f7cc4699882abc417b418fd63b75ba16aa028a318bc180ccfd
                              • Instruction ID: 5e812227441e0f669f98cd6509820cb02e475c4475c64eafeac7616e31276e69
                              • Opcode Fuzzy Hash: d3066824e62218f7cc4699882abc417b418fd63b75ba16aa028a318bc180ccfd
                              • Instruction Fuzzy Hash: B8E06D3530464482EBD1AB12EB983692322FB9DBC0F008010EF0607E61CF69C9AD8705
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSectionThread$CurrentEnterLeave
                              • String ID:
                              • API String ID: 756538297-0
                              • Opcode ID: 666f89412f6a490bf69e771e3a26d109a3e77c65ad2a9c458dc97ae7fac80923
                              • Instruction ID: 35f2555865a433873ff5780301294668e7b8bb1a20c9a9c1aebbc1d03c79c866
                              • Opcode Fuzzy Hash: 666f89412f6a490bf69e771e3a26d109a3e77c65ad2a9c458dc97ae7fac80923
                              • Instruction Fuzzy Hash: 6CE01239610A4A96EBC25FA5F8D83986361F78C791F458421ED0B822B0DE78C68D8305
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: htons
                              • String ID: 127.0.0.1 localhost$::1 localhost
                              • API String ID: 4207154920-1120086647
                              • Opcode ID: f5247e631730124675413672fd432c10110f427f1475c00b52aec52766f7d94a
                              • Instruction ID: ef6883716afff62f60ac27ee9db68d74fefa77d107107d75c71bc2fd372d8cf6
                              • Opcode Fuzzy Hash: f5247e631730124675413672fd432c10110f427f1475c00b52aec52766f7d94a
                              • Instruction Fuzzy Hash: 5091F832704B9889FBA29B60D8103ED67A2E74DBC8F58D111EE5C1B786DF78C689C350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegQueryValueExA.ADVAPI32(?,?,?,00000000,NameServer,0000000180061A79,?,?,?,?,?,00000000,00000000,0000000180058CAB), ref: 00000001800617B0
                              • RegQueryValueExA.ADVAPI32(?,?,?,00000000,NameServer,0000000180061A79,?,?,?,?,?,00000000,00000000,0000000180058CAB), ref: 00000001800617EB
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID: NameServer
                              • API String ID: 3660427363-1451388361
                              • Opcode ID: 3ac3433c278aefa7235ad4b556dc35e659ab14e83d60903c37fb01fccf12c2b3
                              • Instruction ID: 3f9b1f2c86e5a5dbbf27775cae567e3561ab41fd22db7066ef2a861ff396eaac
                              • Opcode Fuzzy Hash: 3ac3433c278aefa7235ad4b556dc35e659ab14e83d60903c37fb01fccf12c2b3
                              • Instruction Fuzzy Hash: B811D53260478489E6929F91E8503DAF395F74D7E5F588135BA9847B98CF78C649CB00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CreateCriticalEventInitializeSection
                              • String ID: N
                              • API String ID: 2948115387-1161386698
                              • Opcode ID: 950bc264ceb1a14922065b0a41bfe72ffcdb81bfc1abfd0444525644b0d392c1
                              • Instruction ID: d160ddb73ac51204d22678014dff6deaa1ae39070f09f746f013f06fb0e41609
                              • Opcode Fuzzy Hash: 950bc264ceb1a14922065b0a41bfe72ffcdb81bfc1abfd0444525644b0d392c1
                              • Instruction Fuzzy Hash: FC21A336215F44C5DB968F74F89039933A9F74CB08F98813AEA8D8B358EF358569C360
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: Timetime
                              • String ID: $_ServerStatus
                              • API String ID: 17336451-2429934550
                              • Opcode ID: 672b665adcdd71ad6fb845b36b19201bf635d7288253c121c38aedb7238a414e
                              • Instruction ID: 5aaf73bfe4d0ef5408aac8ce8ed75bd9fcb4a6fbf99b2d3d491f72d735af7776
                              • Opcode Fuzzy Hash: 672b665adcdd71ad6fb845b36b19201bf635d7288253c121c38aedb7238a414e
                              • Instruction Fuzzy Hash: 41213832A14B8486E785CF35E5543AD33A0F798B4CF14A229EA8C4625AEF74D6E8C740
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: getprotobynumber
                              • String ID: tcp$udp
                              • API String ID: 2881757150-3725065008
                              • Opcode ID: 7a4c2fa2e6778f0c7aa71ee94b1351bed588553b630837462950d2bb232b3413
                              • Instruction ID: c71bddb1f9b1c07b9b4e93fbd8dcd7d5d969708a6c0bf8e718a7d98bfec27c45
                              • Opcode Fuzzy Hash: 7a4c2fa2e6778f0c7aa71ee94b1351bed588553b630837462950d2bb232b3413
                              • Instruction Fuzzy Hash: BDE08634F8250AC1FDEE174E8CCA3EC12A56B4D780FD8801DE21D11760DD5D97AE9705
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID:
                              • API String ID: 3168844106-0
                              • Opcode ID: 724ad86ac54e3935d37c206d10196c819f564b7c412b87f36d2c1631236e154a
                              • Instruction ID: 7b149e0af425acacf097fd825cf9a6164931a1ce2ea4f7607f683c442c696d90
                              • Opcode Fuzzy Hash: 724ad86ac54e3935d37c206d10196c819f564b7c412b87f36d2c1631236e154a
                              • Instruction Fuzzy Hash: 11514936204B4886EBA6DF29E4503A9B3A4F38DF84F188125DF8E87B55DF38C566C700
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID:
                              • API String ID: 3168844106-0
                              • Opcode ID: b70fcadccc1eff5d5d78317c68721dbadc84ec8a5b894f0782efe04bae360ff9
                              • Instruction ID: c5479b60249903c1298fa51bfd89a758d5f5d7a9782d6edff1feb8524f319126
                              • Opcode Fuzzy Hash: b70fcadccc1eff5d5d78317c68721dbadc84ec8a5b894f0782efe04bae360ff9
                              • Instruction Fuzzy Hash: 95415036609F4882FBD39F1598503A973A5E78EBD4F28D421FA4A47794DF39CA59C300
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID:
                              • API String ID: 3168844106-0
                              • Opcode ID: 2d2aad89c112bd046e335b7654fd91015dbd212668f3908bd1ccfc98c42c9e12
                              • Instruction ID: ee7233eae8dc0660c261b0a0cbc87d55d5e804063f944a9017367366de9fa758
                              • Opcode Fuzzy Hash: 2d2aad89c112bd046e335b7654fd91015dbd212668f3908bd1ccfc98c42c9e12
                              • Instruction Fuzzy Hash: D841A23A609B4881FBF29F10D8903D863B1F74EBD8F05C625EE4813696DF34D6888388
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,000000018004ABD1,?,?,?,0000000180048866), ref: 000000018004C29A
                              • EnterCriticalSection.KERNEL32(?,?,?,000000018004ABD1,?,?,?,0000000180048866), ref: 000000018004C2BE
                              • EnterCriticalSection.KERNEL32(?,?,?,000000018004ABD1,?,?,?,0000000180048866), ref: 000000018004C2C9
                              • EnterCriticalSection.KERNEL32(?,?,?,000000018004ABD1,?,?,?,0000000180048866), ref: 000000018004C2FE
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalEnterSection
                              • String ID:
                              • API String ID: 1904992153-0
                              • Opcode ID: 0523b34edc6c0834812ee6f56f67072510d6d6afab527c17681f1378b4a88198
                              • Instruction ID: 9be4146a6633a554857d3f409b8d029a6f83430b7969616b1229434d9fcea357
                              • Opcode Fuzzy Hash: 0523b34edc6c0834812ee6f56f67072510d6d6afab527c17681f1378b4a88198
                              • Instruction Fuzzy Hash: CE216A36200E89D7E7D68F44EA80B997370F749789F108011EE0A926A4DFB5DA6EC749
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,0000000180021955,?,?,?,?,?,?,?,?,?,000000018001FA11), ref: 000000018001B586
                              • LeaveCriticalSection.KERNEL32(?,?,?,0000000180021955,?,?,?,?,?,?,?,?,?,000000018001FA11), ref: 000000018001B5B8
                              • EnterCriticalSection.KERNEL32(?,?,?,0000000180021955,?,?,?,?,?,?,?,?,?,000000018001FA11), ref: 000000018001B5CF
                              • LeaveCriticalSection.KERNEL32(?,?,?,0000000180021955,?,?,?,?,?,?,?,?,?,000000018001FA11), ref: 000000018001B600
                              Memory Dump Source
                              • Source File: 00000003.00000002.2154231495.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000003.00000002.2154202903.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154578784.0000000180252000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154661354.0000000180326000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154687946.0000000180327000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154710169.0000000180328000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154736530.000000018032D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154766267.0000000180331000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2154794562.0000000180335000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID:
                              • API String ID: 3168844106-0
                              • Opcode ID: f0c0f01528244aa17cba52e43c8170c70655f9fb74dcc8f43388cda4cbac4c8f
                              • Instruction ID: 21f0d15febe3675dee7c31e22d56955ba0c37fdf033b7bdb5daca54d9a1cd97d
                              • Opcode Fuzzy Hash: f0c0f01528244aa17cba52e43c8170c70655f9fb74dcc8f43388cda4cbac4c8f
                              • Instruction Fuzzy Hash: A3111E34311D4845FFC79B62E9943E56366BB5CBD1F48D025BD0A866A1DF28C74CC340
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:4.3%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:22%
                              Total number of Nodes:214
                              Total number of Limit Nodes:26
                              execution_graph 22113 1a41b901638 25 API calls 21832 1a41a101fc0 LoadLibraryA 21833 1a41a101fe6 21832->21833 22006 1a41b9117ac CreateToolhelp32Snapshot 22007 1a41b9117e6 22006->22007 22009 1a41b9117df 22006->22009 22008 1a41b9117fa Process32First 22007->22008 22008->22009 22010 1a41b91182e 22008->22010 22010->22010 22011 1a41b90c798 RtlDeleteBoundaryDescriptor 22010->22011 22012 1a41b91187b 22011->22012 22013 1a41b9118a6 FindCloseChangeNotification 22012->22013 22014 1a41b91188c Process32Next 22012->22014 22013->22009 22014->22012 22014->22013 22015 1a41b90fd2c 22016 1a41b90fde7 SleepEx 22015->22016 22017 1a41b90fd55 22015->22017 22017->22016 22083 1a41b904830 RtlDeleteBoundaryDescriptor GetNumberFormatA 22084 1a41b905430 RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap CreateMutexExA 22118 1a41b901254 RtlDeleteBoundaryDescriptor RtlAllocateHeap GetNumberFormatA 22108 1a41b9076d7 18 API calls char_traits 22109 1a41b9056d8 19 API calls 22074 1a41b9054dc RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap GetNumberFormatA CreateMutexExA 21902 1a41a1015e0 21903 1a41a101608 21902->21903 21905 1a41a1015fe 21902->21905 21904 1a41a101755 VirtualProtect 21903->21904 21903->21905 21904->21905 21980 1a41b90d748 21981 1a41b90d774 21980->21981 21982 1a41b90d889 21981->21982 21983 1a41b90d837 RtlAllocateHeap 21981->21983 21983->21981 21983->21982 21984 1a41b90ee48 21989 1a41b9109e8 21984->21989 21987 1a41b90eec4 21988 1a41b90ee9d NtResumeThread 21988->21987 21990 1a41b910a17 21989->21990 21995 1a41b90dd80 21990->21995 21992 1a41b90ee74 21992->21987 21992->21988 21993 1a41b910a6c 21993->21992 21994 1a41b90c798 RtlDeleteBoundaryDescriptor 21993->21994 21994->21992 21998 1a41b90d9e4 21995->21998 21999 1a41b910f98 RtlDeleteBoundaryDescriptor 21998->21999 22001 1a41b90da37 21999->22001 22000 1a41b90db09 22002 1a41b90c798 RtlDeleteBoundaryDescriptor 22000->22002 22001->22000 22004 1a41b90da7b 22001->22004 22005 1a41b90da44 22001->22005 22002->22005 22003 1a41b90c798 RtlDeleteBoundaryDescriptor 22003->22005 22004->22003 22005->21993 22076 1a41b9050cc 20 API calls 22077 1a41b906cd0 7 API calls 22018 1a41b90ecd0 22024 1a41b90e6e8 22018->22024 22020 1a41b90edee 22021 1a41b90ed09 22021->22020 22022 1a41b90ed8f NtProtectVirtualMemory NtWriteVirtualMemory 22021->22022 22022->22020 22023 1a41b90ee10 NtProtectVirtualMemory 22022->22023 22023->22020 22052 1a41b90cc1c 22024->22052 22027 1a41b90e73c NtAllocateVirtualMemory 22029 1a41b90e724 22027->22029 22030 1a41b90e76e 22027->22030 22028 1a41b90e71f 22070 1a41b90cbd4 RtlDeleteBoundaryDescriptor VirtualProtect VirtualProtect 22028->22070 22071 1a41b90cbd4 RtlDeleteBoundaryDescriptor VirtualProtect VirtualProtect 22029->22071 22032 1a41b90c818 RtlAllocateHeap 22030->22032 22034 1a41b90e783 22032->22034 22034->22029 22060 1a41b911bb8 NtAllocateVirtualMemory 22034->22060 22037 1a41b90e7cd 22040 1a41b90c798 RtlDeleteBoundaryDescriptor 22037->22040 22038 1a41b90e7c3 22039 1a41b90c798 RtlDeleteBoundaryDescriptor 22038->22039 22039->22029 22041 1a41b90e7d2 22040->22041 22042 1a41b90c818 RtlAllocateHeap 22041->22042 22047 1a41b90e7fd 22042->22047 22043 1a41b90e895 NtWriteVirtualMemory 22043->22029 22044 1a41b90e8c9 22043->22044 22064 1a41b91b1c4 22044->22064 22047->22029 22047->22043 22048 1a41b90c798 RtlDeleteBoundaryDescriptor 22049 1a41b90e8ea 22048->22049 22072 1a41b90cbd4 RtlDeleteBoundaryDescriptor VirtualProtect VirtualProtect 22049->22072 22051 1a41b90e729 22051->22021 22053 1a41b90cc39 22052->22053 22054 1a41b90cc40 22053->22054 22055 1a41b910f98 RtlDeleteBoundaryDescriptor 22053->22055 22054->22027 22054->22028 22056 1a41b90cc8a 22055->22056 22056->22054 22057 1a41b90cc9b VirtualProtect 22056->22057 22059 1a41b90ccca 22057->22059 22058 1a41b90c798 RtlDeleteBoundaryDescriptor 22058->22054 22059->22058 22061 1a41b911c0c NtWriteVirtualMemory 22060->22061 22063 1a41b90e7b4 22060->22063 22062 1a41b911c29 NtProtectVirtualMemory 22061->22062 22061->22063 22062->22063 22063->22037 22063->22038 22065 1a41b91b1fc NtProtectVirtualMemory 22064->22065 22069 1a41b90e8df 22064->22069 22067 1a41b91b2da char_traits 22065->22067 22065->22069 22068 1a41b91b4b8 NtProtectVirtualMemory 22067->22068 22067->22069 22068->22069 22069->22048 22070->22029 22071->22051 22072->22051 22124 1a41b9055f4 RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 22102 1a41a101cf6 VirtualAlloc 22091 1a41b906ffc RtlDeleteBoundaryDescriptor NtProtectVirtualMemory NtProtectVirtualMemory 21834 1a41a101000 21837 1a41a102650 21834->21837 21836 1a41a10103a 21840 1a41a102050 21837->21840 21839 1a41a10269f 21839->21836 21842 1a41a102098 21840->21842 21841 1a41a10222b GetNativeSystemInfo 21843 1a41a10229a VirtualAlloc 21841->21843 21845 1a41a10209c 21841->21845 21842->21841 21842->21845 21844 1a41a1022c7 VirtualAlloc 21843->21844 21846 1a41a1022ff 21843->21846 21844->21845 21844->21846 21845->21839 21846->21845 21847 1a41a10240a VirtualAlloc 21846->21847 21848 1a41a102450 21847->21848 21852 1a41a101380 21848->21852 21850 1a41a1024ac 21850->21845 21856 1a41a101c80 VirtualAlloc 21850->21856 21854 1a41a1013ce 21852->21854 21853 1a41a101458 21853->21850 21854->21853 21855 1a41a1014cb VirtualAlloc 21854->21855 21855->21853 21856->21845 21857 1a41b901000 21858 1a41b901023 21857->21858 21861 1a41b9017c4 21858->21861 21862 1a41b9017e4 21861->21862 21879 1a41b90cb28 21862->21879 21864 1a41b9017f0 21865 1a41b90199c LoadLibraryA LoadLibraryA 21864->21865 21866 1a41b9017f5 21865->21866 21866->21866 21867 1a41b90c798 RtlDeleteBoundaryDescriptor 21866->21867 21868 1a41b90183b 21867->21868 21869 1a41b910450 12 API calls 21868->21869 21871 1a41b901840 21869->21871 21870 1a41b9018f9 21872 1a41b90ea84 19 API calls 21870->21872 21876 1a41b901927 21870->21876 21871->21870 21874 1a41b9010c5 ExitProcess 21871->21874 21875 1a41b902944 RtlDeleteBoundaryDescriptor GetNumberFormatA 21871->21875 21872->21876 21873 1a41b9014c4 23 API calls 21873->21874 21877 1a41b90189d 21875->21877 21876->21873 21876->21874 21878 1a41b90dd5c RtlDeleteBoundaryDescriptor 21877->21878 21878->21870 21884 1a41b91470c CreateMutexExA 21879->21884 21881 1a41b90cb3d 21886 1a41b90ca3c 21881->21886 21885 1a41b914737 21884->21885 21885->21881 21887 1a41b90ca53 21886->21887 21892 1a41b90cac3 21886->21892 21894 1a41b910f98 21887->21894 21890 1a41b90ca99 VirtualProtect 21891 1a41b90caca 21890->21891 21890->21892 21893 1a41b90cae0 VirtualProtect 21891->21893 21893->21892 21895 1a41b910fed 21894->21895 21897 1a41b90ca89 21895->21897 21898 1a41b90c798 21895->21898 21897->21890 21897->21892 21899 1a41b90c812 21898->21899 21901 1a41b90c79d 21898->21901 21899->21897 21900 1a41b90c800 RtlDeleteBoundaryDescriptor 21900->21899 21901->21899 21901->21900 21906 1a41a101200 21907 1a41a101215 21906->21907 21909 1a41a10122d 21907->21909 21910 1a41a1011c0 VirtualAlloc 21907->21910 21910->21909 21911 1a41b911c80 21912 1a41b91a80e 21911->21912 21913 1a41b911caf CreateProcessW 21912->21913 21914 1a41a0d0000 21916 1a41a0d0005 21914->21916 21919 1a41a0d0040 21916->21919 21920 1a41a0d0074 21919->21920 21921 1a41a0d012a GetNativeSystemInfo 21920->21921 21925 1a41a0d003b 21920->21925 21922 1a41a0d0165 VirtualAlloc 21921->21922 21921->21925 21923 1a41a0d018e 21922->21923 21924 1a41a0d03fc VirtualProtect 21923->21924 21923->21925 21924->21923 21924->21925 21926 1a41b9010e8 21927 1a41b901101 HeapCreate 21926->21927 21928 1a41b90119c 21926->21928 21929 1a41b90111d 21927->21929 21942 1a41b91b0dc 21929->21942 21934 1a41b90cf3c 2 API calls 21935 1a41b901168 21934->21935 21952 1a41b90ddc0 21935->21952 21938 1a41b901197 21955 1a41b90dd5c 21938->21955 21939 1a41b9011a3 21941 1a41b90dd5c RtlDeleteBoundaryDescriptor 21939->21941 21941->21928 21944 1a41b91b101 21942->21944 21959 1a41b90c818 21944->21959 21946 1a41b90cf3c 21947 1a41b90cf74 21946->21947 21948 1a41b90cfc1 LoadLibraryA 21947->21948 21949 1a41b90cfb9 21947->21949 21948->21949 21950 1a41b90114d 21949->21950 21962 1a41b90ceb0 21949->21962 21950->21934 21970 1a41b90db60 21952->21970 21956 1a41b90dd78 21955->21956 21957 1a41b90dd6c 21955->21957 21956->21928 21958 1a41b90c798 RtlDeleteBoundaryDescriptor 21957->21958 21958->21956 21960 1a41b90c834 RtlAllocateHeap 21959->21960 21961 1a41b901136 21959->21961 21960->21961 21961->21946 21963 1a41b90cf19 21962->21963 21964 1a41b90cedd 21962->21964 21963->21950 21964->21963 21966 1a41b90cd48 21964->21966 21967 1a41b90cd74 21966->21967 21969 1a41b90cdd0 21966->21969 21968 1a41b90ce42 LoadLibraryA 21967->21968 21967->21969 21968->21969 21969->21964 21971 1a41b910f98 RtlDeleteBoundaryDescriptor 21970->21971 21973 1a41b90dbb7 21971->21973 21972 1a41b90dc01 GetNumberFormatA 21975 1a41b90dc2f 21972->21975 21973->21972 21978 1a41b901179 GetFileAttributesW 21973->21978 21974 1a41b90dc82 21979 1a41b90c798 RtlDeleteBoundaryDescriptor 21974->21979 21975->21974 21976 1a41b90dcac 21975->21976 21977 1a41b90c798 RtlDeleteBoundaryDescriptor 21976->21977 21977->21978 21978->21938 21978->21939 21979->21978 22086 1a41b909868 RtlDeleteBoundaryDescriptor LoadLibraryA LoadLibraryA 22119 1a41b901e6c 6 API calls 22088 1a41b90349c 23 API calls 22128 1a41b905a1c 7 API calls 22136 1a41b9031a0 RtlDeleteBoundaryDescriptor 22137 1a41b902984 7 API calls 22081 1a41b90590c RtlDeleteBoundaryDescriptor RtlAllocateHeap

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 1a41b91b1c4-1a41b91b1f0 1 1a41b91b1fc-1a41b91b252 0->1 2 1a41b91b1f2-1a41b91b1f7 0->2 4 1a41b91b25a-1a41b91b25e 1->4 3 1a41b91b521-1a41b91b528 2->3 5 1a41b91b260 4->5 6 1a41b91b262-1a41b91b2c6 NtProtectVirtualMemory 4->6 5->4 7 1a41b91b2c8-1a41b91b2cc 6->7 8 1a41b91b2da-1a41b91b2e2 6->8 9 1a41b91b2ce 7->9 10 1a41b91b2d0-1a41b91b2d5 7->10 11 1a41b91b2ee-1a41b91b2fe 8->11 9->7 10->3 12 1a41b91b304-1a41b91b316 11->12 13 1a41b91b51f 11->13 14 1a41b91b318 12->14 15 1a41b91b31a-1a41b91b3ab call 1a41b90c9fc call 1a41b90c910 12->15 13->3 14->11 21 1a41b91b3ad-1a41b91b3b5 15->21 22 1a41b91b402-1a41b91b40a 15->22 23 1a41b91b3b7-1a41b91b3bf 21->23 24 1a41b91b40f-1a41b91b428 21->24 25 1a41b91b4b0-1a41b91b4b4 22->25 26 1a41b91b3c5-1a41b91b3cd 23->26 27 1a41b91b480-1a41b91b488 23->27 30 1a41b91b42a-1a41b91b43b 24->30 31 1a41b91b47e 24->31 28 1a41b91b4b6 25->28 29 1a41b91b4b8-1a41b91b506 NtProtectVirtualMemory 25->29 32 1a41b91b48a-1a41b91b492 26->32 33 1a41b91b3d3-1a41b91b3db 26->33 27->25 28->25 34 1a41b91b508-1a41b91b50c 29->34 35 1a41b91b512-1a41b91b516 29->35 30->31 36 1a41b91b43d-1a41b91b44e 30->36 31->25 32->25 37 1a41b91b494-1a41b91b49c 33->37 38 1a41b91b3e1-1a41b91b3e9 33->38 39 1a41b91b50e 34->39 40 1a41b91b510 34->40 41 1a41b91b518 35->41 42 1a41b91b51a 35->42 36->31 43 1a41b91b450-1a41b91b461 36->43 37->25 44 1a41b91b3ef-1a41b91b3f7 38->44 45 1a41b91b49e-1a41b91b4a6 38->45 39->34 40->42 41->35 42->13 43->31 46 1a41b91b463-1a41b91b474 43->46 47 1a41b91b4a8 44->47 48 1a41b91b3fd 44->48 45->25 46->31 49 1a41b91b476 46->49 47->25 48->25 49->31
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: MemoryProtectVirtual
                              • String ID: @
                              • API String ID: 2706961497-2766056989
                              • Opcode ID: 7e16444e689eb8bee9c1e675e220fd9db7de344bf7600226cd6d405b408096b5
                              • Instruction ID: 43e7725a0a9b3cca1c8444f4200e07152f168e04ea7fee198c041fdbccea5e90
                              • Opcode Fuzzy Hash: 7e16444e689eb8bee9c1e675e220fd9db7de344bf7600226cd6d405b408096b5
                              • Instruction Fuzzy Hash: 56A141302297448FE7A0DB18C495BAAB7E5FBD9315F50492EE186C7390E7B4D886DB03
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFirstProcess32SnapshotToolhelp32
                              • String ID:
                              • API String ID: 2353314856-0
                              • Opcode ID: ffda93136b51a29bb3684a86e7e043dd7bbdc087f215b77c9927dab396927b19
                              • Instruction ID: d7e92a671bb01170faa4f4deb33b27711c76f0fbb979c543bbc5edb4619b6138
                              • Opcode Fuzzy Hash: ffda93136b51a29bb3684a86e7e043dd7bbdc087f215b77c9927dab396927b19
                              • Instruction Fuzzy Hash: C131E330318A188FEB55EF29D8846E677E2FBD9310F008679D44AC7291EF74E9468782
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 156 1a41b910450-1a41b910489 157 1a41b9109d4 156->157 158 1a41b91048f-1a41b9104a6 156->158 159 1a41b9109d6-1a41b9109e5 157->159 158->157 161 1a41b9104ac-1a41b9104fa call 1a41b91bc10 158->161 167 1a41b91050b-1a41b910531 call 1a41b9135e4 call 1a41b913764 161->167 168 1a41b9104fc-1a41b910505 call 1a41b90d05c 161->168 176 1a41b91053f-1a41b91054e call 1a41b91365c 167->176 177 1a41b910533-1a41b91053d 167->177 168->167 178 1a41b910554-1a41b9105db call 1a41b914328 call 1a41b914270 LookupAccountSidW 176->178 177->178 185 1a41b9105dd 178->185 186 1a41b9105e3-1a41b91061e 178->186 185->186 188 1a41b91063c-1a41b91064b 186->188 189 1a41b910620-1a41b91062a 186->189 192 1a41b91064d-1a41b910651 188->192 193 1a41b910653-1a41b910656 call 1a41b910214 188->193 194 1a41b91062c-1a41b910630 189->194 195 1a41b910632-1a41b91063a call 1a41b910378 189->195 192->193 196 1a41b91065b-1a41b91066a 192->196 193->196 194->195 194->196 195->196 199 1a41b91067b-1a41b9106a4 call 1a41b912538 call 1a41b912464 196->199 200 1a41b91066c-1a41b910675 call 1a41b90d05c 196->200 208 1a41b9106a6-1a41b9106c6 199->208 209 1a41b9106cf-1a41b9106df 199->209 200->199 208->209 216 1a41b9106c8-1a41b9106cc 208->216 210 1a41b9106f5-1a41b9106f8 209->210 211 1a41b9106fa-1a41b9106ff 210->211 212 1a41b9106e1-1a41b9106f1 210->212 214 1a41b91071e-1a41b91072c 211->214 215 1a41b910701-1a41b910708 211->215 212->210 218 1a41b91072e-1a41b910731 214->218 219 1a41b910740-1a41b9107ae call 1a41b914404 call 1a41b912674 call 1a41b9137f0 call 1a41b91a80e 214->219 217 1a41b91070a-1a41b91071c 215->217 216->209 217->214 217->217 218->219 220 1a41b910733-1a41b910734 218->220 232 1a41b9107cc-1a41b9107d4 219->232 233 1a41b9107b0-1a41b9107c6 219->233 222 1a41b910736-1a41b91073e 220->222 222->219 222->222 234 1a41b9107d6-1a41b9107db 232->234 235 1a41b9107dd-1a41b9107e8 GetSystemInfo 232->235 233->232 237 1a41b9107ed-1a41b91083a call 1a41b90ddc0 234->237 235->237 243 1a41b91083c-1a41b910847 237->243 244 1a41b91084f-1a41b910881 call 1a41b90dd5c 237->244 243->244 248 1a41b9108bd-1a41b9108e0 244->248 249 1a41b910883-1a41b9108b5 call 1a41b910c4c 244->249 253 1a41b9108f9-1a41b91091a 248->253 254 1a41b9108e2-1a41b9108f1 248->254 249->248 256 1a41b910937-1a41b910962 253->256 257 1a41b91091c-1a41b91092b 253->257 254->253 259 1a41b910964-1a41b910967 256->259 260 1a41b910976-1a41b9109d2 call 1a41b914404 call 1a41b91bc10 call 1a41b91bbc8 call 1a41b90d0a4 call 1a41b90fe1c 256->260 257->256 259->260 262 1a41b910969-1a41b91096a 259->262 260->159 263 1a41b91096c-1a41b910974 262->263 263->260 263->263
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AccountInfoLookupSystem
                              • String ID:
                              • API String ID: 229831287-3916222277
                              • Opcode ID: e8f6389103c2505388ad839d792f361971cefc2c7a7f621b498c69dfb205a58f
                              • Instruction ID: 3f5dd9872004d06e9339a1b2bbc316fb2187c4afde22f4cd503c0afeb862c53d
                              • Opcode Fuzzy Hash: e8f6389103c2505388ad839d792f361971cefc2c7a7f621b498c69dfb205a58f
                              • Instruction Fuzzy Hash: 03027A30715A098FE759EF28D8597E973D1FB99311F004269E44AC7292EF74A982CBC2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateMemoryVirtual$BoundaryDeleteDescriptorHeapWrite
                              • String ID: @
                              • API String ID: 2532212394-2766056989
                              • Opcode ID: 1a83dd0e45781d205477159a2f30f598c6995d95ffc471ecefc90e072d21656c
                              • Instruction ID: fba7f8dbb9ed8a52bccc6d96f638f86fde06cc9f286dd14943731759b6232564
                              • Opcode Fuzzy Hash: 1a83dd0e45781d205477159a2f30f598c6995d95ffc471ecefc90e072d21656c
                              • Instruction Fuzzy Hash: 0D617130729E488FEB58EF5CC845BF937E5FB95351F144169A849C3291EB74E8838B82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 315 1a41a0d0040-1a41a0d00ce call 1a41a0d0518 * 6 328 1a41a0d00d0-1a41a0d00d2 315->328 329 1a41a0d00d7-1a41a0d00e0 315->329 330 1a41a0d0504-1a41a0d0514 328->330 329->328 331 1a41a0d00e2-1a41a0d00ec 329->331 331->328 332 1a41a0d00ee-1a41a0d00fc 331->332 333 1a41a0d00fe-1a41a0d0106 332->333 334 1a41a0d012a-1a41a0d015f GetNativeSystemInfo 332->334 335 1a41a0d0108-1a41a0d010d 333->335 334->328 336 1a41a0d0165-1a41a0d018c VirtualAlloc 334->336 339 1a41a0d010f-1a41a0d0114 335->339 340 1a41a0d0116-1a41a0d0118 335->340 337 1a41a0d01cd-1a41a0d01d9 336->337 338 1a41a0d018e-1a41a0d0197 336->338 342 1a41a0d0213-1a41a0d0221 337->342 343 1a41a0d01db-1a41a0d01e0 337->343 341 1a41a0d0199-1a41a0d019f 338->341 344 1a41a0d011a-1a41a0d0128 339->344 340->344 345 1a41a0d01a1-1a41a0d01aa 341->345 346 1a41a0d01ba-1a41a0d01bd 341->346 348 1a41a0d02b1-1a41a0d02c5 342->348 349 1a41a0d0227-1a41a0d0228 342->349 347 1a41a0d01e2-1a41a0d01f8 343->347 344->334 344->335 345->346 350 1a41a0d01ac-1a41a0d01b3 345->350 351 1a41a0d01bf-1a41a0d01cb 346->351 352 1a41a0d020a-1a41a0d0211 347->352 353 1a41a0d01fa-1a41a0d0208 347->353 354 1a41a0d0360-1a41a0d036b 348->354 355 1a41a0d02cb-1a41a0d02d9 348->355 356 1a41a0d022c-1a41a0d0244 349->356 350->346 357 1a41a0d01b5-1a41a0d01b8 350->357 351->337 351->341 352->342 352->347 353->352 353->353 358 1a41a0d0371-1a41a0d0382 354->358 359 1a41a0d0440-1a41a0d0464 354->359 355->354 360 1a41a0d02df 355->360 364 1a41a0d028f-1a41a0d0293 356->364 357->351 362 1a41a0d0384-1a41a0d038c 358->362 396 1a41a0d0501-1a41a0d0502 359->396 397 1a41a0d046a-1a41a0d0471 359->397 363 1a41a0d02e4-1a41a0d02f8 360->363 365 1a41a0d0392-1a41a0d03ad 362->365 366 1a41a0d042f-1a41a0d0436 362->366 368 1a41a0d0353-1a41a0d035e 363->368 369 1a41a0d02fa-1a41a0d030c 363->369 370 1a41a0d0295-1a41a0d029e 364->370 371 1a41a0d0246-1a41a0d024a 364->371 373 1a41a0d03cd-1a41a0d03cf 365->373 374 1a41a0d03af-1a41a0d03b1 365->374 366->362 372 1a41a0d043c-1a41a0d043d 366->372 368->354 368->363 375 1a41a0d030e-1a41a0d0315 369->375 376 1a41a0d0317-1a41a0d031b 369->376 370->356 381 1a41a0d02a0-1a41a0d02ad 370->381 379 1a41a0d024c-1a41a0d0273 371->379 380 1a41a0d0275-1a41a0d0280 371->380 372->359 385 1a41a0d03d1-1a41a0d03d3 373->385 386 1a41a0d03e9-1a41a0d03eb 373->386 382 1a41a0d03b3-1a41a0d03bc 374->382 383 1a41a0d03be-1a41a0d03cb 374->383 387 1a41a0d034b-1a41a0d0351 375->387 377 1a41a0d031d-1a41a0d0324 376->377 378 1a41a0d0326-1a41a0d032a 376->378 377->387 390 1a41a0d033d-1a41a0d0341 378->390 391 1a41a0d032c-1a41a0d033b 378->391 392 1a41a0d0284-1a41a0d028c 379->392 380->392 381->348 395 1a41a0d03fc-1a41a0d0429 VirtualProtect 382->395 383->395 388 1a41a0d03da-1a41a0d03dc 385->388 389 1a41a0d03d5-1a41a0d03d8 385->389 393 1a41a0d03f2-1a41a0d03f9 386->393 394 1a41a0d03ed-1a41a0d03f0 386->394 387->368 387->369 388->386 399 1a41a0d03de-1a41a0d03e0 388->399 389->395 390->387 400 1a41a0d0343-1a41a0d0348 390->400 391->387 392->364 393->395 394->395 395->328 395->366 396->330 397->396 398 1a41a0d0477-1a41a0d0487 397->398 398->396 401 1a41a0d0489-1a41a0d048d 398->401 399->395 402 1a41a0d03e2-1a41a0d03e7 399->402 400->387 401->396 403 1a41a0d048f-1a41a0d04a2 401->403 402->395 403->396 404 1a41a0d04a4-1a41a0d04aa 403->404 405 1a41a0d04ac-1a41a0d04bd 404->405 405->405 406 1a41a0d04bf-1a41a0d04c2 405->406 407 1a41a0d04d4-1a41a0d04db 406->407 408 1a41a0d04c4-1a41a0d04d0 406->408 407->396 410 1a41a0d04dd-1a41a0d04fe 407->410 408->404 409 1a41a0d04d2 408->409 409->396 410->396
                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2179248939.000001A41A0D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41A0D0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41a0d0000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocInfoNativeSystemVirtual
                              • String ID:
                              • API String ID: 2032221330-0
                              • Opcode ID: fe0722d3315e7ef3b87ace32a9ae9c35e0cc2ee78d2a8ddc83f8ab708bb7752a
                              • Instruction ID: 3808f33f693ed78bda6709160e56f020d9bbb9e8ceab1344a8c175168c7b8ee6
                              • Opcode Fuzzy Hash: fe0722d3315e7ef3b87ace32a9ae9c35e0cc2ee78d2a8ddc83f8ab708bb7752a
                              • Instruction Fuzzy Hash: 6AF1F432715A094FE768DE28C8853F577D1FB96761F14417DD88BC3285EBB4F8828682
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: MemoryVirtual$Protect$Write
                              • String ID:
                              • API String ID: 3502917991-0
                              • Opcode ID: 9a5cc5c7fbd3fe2fdcbd9315215d82efc283155e9b77592adc4638bc95343460
                              • Instruction ID: 4c2ae38730e460aeb43ec878651ef895b83e71a8f1334e2288374acd97f18867
                              • Opcode Fuzzy Hash: 9a5cc5c7fbd3fe2fdcbd9315215d82efc283155e9b77592adc4638bc95343460
                              • Instruction Fuzzy Hash: 2741A571618E488FDB54EF1CD885BAAB7E4FB99301F00056EE44DC3252EB70E942CB86
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: MemoryVirtual$AllocateProtectWrite
                              • String ID:
                              • API String ID: 2264391890-0
                              • Opcode ID: 068bdf11f20101efba43b0a73501a7a280c7f6309aa1e863de1acfdaa37b6154
                              • Instruction ID: e42c0fd948e84de9b8e9ab74b2bcc1607e7cdc940f1dbdd789aaa29155a7bd81
                              • Opcode Fuzzy Hash: 068bdf11f20101efba43b0a73501a7a280c7f6309aa1e863de1acfdaa37b6154
                              • Instruction Fuzzy Hash: 5C31A571718A1C9FDB44DF59C885BEEB7F4FB88315F40066AE54AC3240DB74E5858B81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: c0759a78d45f7783e0ba5955d2095ebf6ddd7f5cb97bae5f18963bef716cecab
                              • Instruction ID: fc762b79c8d3ecf077cd0770a1e681b2116200659361d98e8bfe335d7d629f37
                              • Opcode Fuzzy Hash: c0759a78d45f7783e0ba5955d2095ebf6ddd7f5cb97bae5f18963bef716cecab
                              • Instruction Fuzzy Hash: 13118230308A088FE744EF2DD898A6677E2FBE8311B048569A45AC7265CF34D952CB41
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 50 1a41a102050-1a41a10209a call 1a41a101340 53 1a41a10209c-1a41a10209e 50->53 54 1a41a1020a3-1a41a1020bd 50->54 55 1a41a10263b-1a41a102642 53->55 56 1a41a1020bf-1a41a1020cc 54->56 57 1a41a1020d1-1a41a1020fa call 1a41a101340 54->57 56->55 61 1a41a1020fc-1a41a1020fe 57->61 62 1a41a102103-1a41a10212a 57->62 61->55 63 1a41a10212c-1a41a102139 62->63 64 1a41a10213e-1a41a10214c 62->64 63->55 65 1a41a10214e-1a41a10215b 64->65 66 1a41a102160-1a41a10216d 64->66 65->55 67 1a41a10216f-1a41a10217c 66->67 68 1a41a102181-1a41a1021b1 66->68 67->55 71 1a41a1021cb-1a41a1021d8 68->71 73 1a41a1021da-1a41a1021e3 71->73 74 1a41a10222b-1a41a102286 GetNativeSystemInfo 71->74 75 1a41a1021e5-1a41a1021fa 73->75 76 1a41a1021fc-1a41a10220f 73->76 77 1a41a102288-1a41a102295 74->77 78 1a41a10229a-1a41a1022c5 VirtualAlloc 74->78 81 1a41a102213-1a41a10221d 75->81 76->81 77->55 79 1a41a1022c7-1a41a1022eb VirtualAlloc 78->79 80 1a41a1022ff-1a41a102324 78->80 79->80 83 1a41a1022ed-1a41a1022fa 79->83 90 1a41a102326-1a41a102346 80->90 91 1a41a10234b-1a41a102369 80->91 84 1a41a102229 81->84 85 1a41a10221f-1a41a102225 81->85 83->55 84->71 85->84 90->55 92 1a41a102375 91->92 93 1a41a10236b-1a41a102373 91->93 94 1a41a10237d-1a41a1023fe call 1a41a101340 92->94 93->94 99 1a41a10240a-1a41a1024a7 VirtualAlloc call 1a41a101120 call 1a41a101380 94->99 100 1a41a102400 94->100 107 1a41a1024ac-1a41a1024ae 99->107 101 1a41a102627-1a41a102639 call 1a41a1028e0 100->101 101->55 108 1a41a1024ba-1a41a1024e3 107->108 109 1a41a1024b0 107->109 110 1a41a1024e5-1a41a102507 call 1a41a101ab0 108->110 111 1a41a102509-1a41a10250e 108->111 109->101 113 1a41a102515-1a41a102529 call 1a41a101c80 110->113 111->113 117 1a41a102535-1a41a102549 call 1a41a101790 113->117 118 1a41a10252b 113->118 121 1a41a102555-1a41a102569 call 1a41a1019f0 117->121 122 1a41a10254b 117->122 118->101 125 1a41a102575-1a41a102581 121->125 126 1a41a10256b 121->126 122->101 127 1a41a102587-1a41a102590 125->127 128 1a41a102613-1a41a102619 125->128 126->101 129 1a41a1025f2-1a41a10260e 127->129 130 1a41a102592-1a41a1025d3 127->130 131 1a41a102620-1a41a102625 128->131 132 1a41a102611 129->132 134 1a41a1025e4-1a41a1025f0 130->134 135 1a41a1025d5-1a41a1025e0 130->135 131->55 132->131 134->132 135->101
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001A41A101000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41a101000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1e356398b98103127d6b8e33339f1ca3f6c0dda63d8c4eb172e2624df61f1aed
                              • Instruction ID: de278d09fbb6a7b1482264534baf9443e0bf51f107612841bef46af2599683f6
                              • Opcode Fuzzy Hash: 1e356398b98103127d6b8e33339f1ca3f6c0dda63d8c4eb172e2624df61f1aed
                              • Instruction Fuzzy Hash: E012E030219B589FE7A4DB18C554FAAB7E1FBE9341F50492DF589C72A1DB74E880CB02
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 436 1a41b90cd48-1a41b90cd72 437 1a41b90cd74-1a41b90cd93 436->437 438 1a41b90cdd0 436->438 437->438 440 1a41b90cd95-1a41b90cd9f 437->440 439 1a41b90cdd2-1a41b90cdeb 438->439 441 1a41b90cda1-1a41b90cda3 440->441 442 1a41b90cdb2-1a41b90cdc2 call 1a41b914404 440->442 441->442 444 1a41b90cda5-1a41b90cda6 441->444 447 1a41b90cdc4-1a41b90cdce 442->447 448 1a41b90cdec-1a41b90cdfb 442->448 445 1a41b90cda8-1a41b90cdb0 444->445 445->442 445->445 447->438 447->440 449 1a41b90cea8-1a41b90ceab 448->449 450 1a41b90ce01-1a41b90ce0f 448->450 449->439 450->449 451 1a41b90ce15-1a41b90ce26 450->451 452 1a41b90ce28-1a41b90ce2e 451->452 453 1a41b90ce30-1a41b90ce32 452->453 454 1a41b90ce42-1a41b90ce80 LoadLibraryA 452->454 453->454 455 1a41b90ce34-1a41b90ce40 453->455 454->438 456 1a41b90ce86-1a41b90ce9d 454->456 455->452 455->454 456->438 458 1a41b90cea3 456->458 458->439
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID: .
                              • API String ID: 1029625771-248832578
                              • Opcode ID: db5f9d9086a8e06d692949b81f8cda11d7b206f02a6c7af3140ca7577404dbc1
                              • Instruction ID: f28cde20f1821aa861dc135d9f27be4f87a3fe9d48fb7da5d674df96255cb09e
                              • Opcode Fuzzy Hash: db5f9d9086a8e06d692949b81f8cda11d7b206f02a6c7af3140ca7577404dbc1
                              • Instruction Fuzzy Hash: DA412A31628B844FE719DF18D4887E17BE9FB9A304F1401BDD4CAC7243EA64E8878752
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 459 1a41b911c80-1a41b911d0b call 1a41b91a80e CreateProcessW
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateProcess
                              • String ID: h
                              • API String ID: 963392458-2439710439
                              • Opcode ID: 251b90b8968926f84e5ae4e49aae40587a68ef062a1c338474a892719cac78e7
                              • Instruction ID: 579db6d53ee03afb177b5d857e64768d5308cfeed7c8ead8e2a7de76308bf68c
                              • Opcode Fuzzy Hash: 251b90b8968926f84e5ae4e49aae40587a68ef062a1c338474a892719cac78e7
                              • Instruction Fuzzy Hash: AF012D71918A498FE794EF38D449B6AB7E1FBA9305F00872FA489C3161EF74C5858701
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AttributesCreateFileHeapLibraryLoad
                              • String ID:
                              • API String ID: 4276963072-0
                              • Opcode ID: 1127199ac6a5b9d7ef7dd636ac9cceddd14e8ea7157a8e53c7f3a8997d5e66f3
                              • Instruction ID: f1bdedc83ac34bdb9ea1ea29d502068b08de99a52ea9c87967bf6f91125a5239
                              • Opcode Fuzzy Hash: 1127199ac6a5b9d7ef7dd636ac9cceddd14e8ea7157a8e53c7f3a8997d5e66f3
                              • Instruction Fuzzy Hash: 2231A530725A448FF7A8EB79D8843EA76E5FBC9310F50462DB05AC22E1EA7895478702
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: InformationToken$BoundaryDeleteDescriptor
                              • String ID:
                              • API String ID: 3818583554-0
                              • Opcode ID: 10c0e65d44493fe69fa6811ea6a7530f65771d2f876b457d79cb99a31aa64b79
                              • Instruction ID: 8dee3f12c2291b5444400f22edf3d27ae0cb8f5a666571327f8bf0bb21a473a1
                              • Opcode Fuzzy Hash: 10c0e65d44493fe69fa6811ea6a7530f65771d2f876b457d79cb99a31aa64b79
                              • Instruction Fuzzy Hash: 5721503071CB098FEB48DF6CD4886A677E1FB98711F01456EE85DC3255EB70E9818782
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: e2fd439c977814d937363450f4d1bdbc27d01c71164ee41ec0a2ce8f8d17686f
                              • Instruction ID: 43a2c7e50aa63d3f064e35f1cd1906c501d0a449cebaab43aef01750fe44659c
                              • Opcode Fuzzy Hash: e2fd439c977814d937363450f4d1bdbc27d01c71164ee41ec0a2ce8f8d17686f
                              • Instruction Fuzzy Hash: 8C216230328A858FE750DB28E894BE973F9F795324F144619E955C32E0E778E882D743
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 516 1a41b90db60-1a41b90dbc1 call 1a41b910f98 519 1a41b90dbcf-1a41b90dbd7 516->519 520 1a41b90dbc3-1a41b90dbca 516->520 522 1a41b90dbd9-1a41b90dbda 519->522 523 1a41b90dc01-1a41b90dc2d GetNumberFormatA 519->523 521 1a41b90dd1b-1a41b90dd3b 520->521 524 1a41b90dbdd-1a41b90dbec 522->524 525 1a41b90dc2f-1a41b90dc32 523->525 526 1a41b90dc43-1a41b90dc46 523->526 527 1a41b90dbfb-1a41b90dbff 524->527 528 1a41b90dbee-1a41b90dbf7 524->528 529 1a41b90dc35-1a41b90dc3f 525->529 530 1a41b90dc49-1a41b90dc55 526->530 527->523 528->524 531 1a41b90dbf9 528->531 529->529 532 1a41b90dc41 529->532 530->530 533 1a41b90dc57-1a41b90dc5a 530->533 531->523 532->533 534 1a41b90dcbd-1a41b90dce6 533->534 535 1a41b90dc5c-1a41b90dc66 533->535 541 1a41b90dcf8-1a41b90dcf9 534->541 542 1a41b90dce8-1a41b90dce9 534->542 536 1a41b90dc68-1a41b90dc80 535->536 537 1a41b90dcac-1a41b90dcb8 call 1a41b90c798 535->537 536->537 546 1a41b90dc82-1a41b90dc86 536->546 537->520 545 1a41b90dcfc-1a41b90dd03 541->545 544 1a41b90dcec-1a41b90dcf4 542->544 544->544 548 1a41b90dcf6 544->548 545->545 549 1a41b90dd05-1a41b90dd06 545->549 547 1a41b90dc88-1a41b90dca8 546->547 547->547 550 1a41b90dcaa 547->550 548->549 551 1a41b90dd0c-1a41b90dd19 call 1a41b90c798 549->551 550->551 551->521
                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FormatNumber
                              • String ID:
                              • API String ID: 481257995-0
                              • Opcode ID: e91297c014f3019d6219160346150f9916988d567e6d4f2d1a1d741306d0e3a8
                              • Instruction ID: 89388316e64e7fee50f45599f1fb26a12b93ed81958bafa3fb8f25a3958850e7
                              • Opcode Fuzzy Hash: e91297c014f3019d6219160346150f9916988d567e6d4f2d1a1d741306d0e3a8
                              • Instruction Fuzzy Hash: 6961C831629E1C4BEB19DF18D4846ED77E9EF9A300F10426AD88BD3191FA60F9878785
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 554 1a41b90d748-1a41b90d772 555 1a41b90d774-1a41b90d777 554->555 556 1a41b90d787-1a41b90d793 554->556 555->556 557 1a41b90d779-1a41b90d77a 555->557 558 1a41b90d795-1a41b90d799 556->558 559 1a41b90d7c6-1a41b90d7d0 556->559 560 1a41b90d77c-1a41b90d785 557->560 561 1a41b90d79b-1a41b90d79e 558->561 562 1a41b90d8a4 559->562 563 1a41b90d7d6-1a41b90d7f0 559->563 560->556 560->560 564 1a41b90d7b1-1a41b90d7b4 561->564 565 1a41b90d7a0-1a41b90d7a3 561->565 566 1a41b90d8a6-1a41b90d8b6 562->566 563->562 571 1a41b90d7f6-1a41b90d7fe 563->571 569 1a41b90d7bb 564->569 570 1a41b90d7b6-1a41b90d7b9 564->570 568 1a41b90d7a5-1a41b90d7a7 565->568 565->569 572 1a41b90d7a9-1a41b90d7ad 568->572 573 1a41b90d7bd-1a41b90d7c4 568->573 569->573 570->573 574 1a41b90d804-1a41b90d807 571->574 575 1a41b90d892-1a41b90d89d 571->575 572->570 576 1a41b90d7af 572->576 573->559 573->561 577 1a41b90d809-1a41b90d80d 574->577 575->566 578 1a41b90d89f-1a41b90d8a2 575->578 576->573 579 1a41b90d814-1a41b90d821 577->579 580 1a41b90d80f-1a41b90d812 577->580 578->566 582 1a41b90d82b-1a41b90d835 579->582 583 1a41b90d823-1a41b90d825 579->583 580->579 581 1a41b90d87c-1a41b90d885 580->581 584 1a41b90d887 581->584 585 1a41b90d88d-1a41b90d88e 581->585 587 1a41b90d837-1a41b90d84f RtlAllocateHeap 582->587 588 1a41b90d889-1a41b90d88a 582->588 583->582 586 1a41b90d827-1a41b90d829 583->586 584->577 585->575 589 1a41b90d877-1a41b90d878 586->589 587->585 590 1a41b90d851-1a41b90d85b 587->590 588->585 589->581 591 1a41b90d85d-1a41b90d85e 590->591 592 1a41b90d86f-1a41b90d874 590->592 593 1a41b90d860-1a41b90d86d 591->593 592->589 593->592 593->593
                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: d2a1e527fbfe5384fae60d444219002c33f295322476ba4f288b93bf19bf1c8e
                              • Instruction ID: abc4bfb76a41a4dadc5df94ef3646dfbce0212cd35d40b2503e5f02cd95e5f1f
                              • Opcode Fuzzy Hash: d2a1e527fbfe5384fae60d444219002c33f295322476ba4f288b93bf19bf1c8e
                              • Instruction Fuzzy Hash: 4651E67162EE590BF769AA2C58053B976C9EFD7311F24412DDCD7C30A1EA90E8834682
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001A41A101000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41a101000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a221755777af9304f0073199aa4e16a510aa1628721def79ae2af35cb4ac584b
                              • Instruction ID: 27668d51b7970bb8b66d1d7608f96dc023dd962da2b83f401dd8eaa9fbfdbc9d
                              • Opcode Fuzzy Hash: a221755777af9304f0073199aa4e16a510aa1628721def79ae2af35cb4ac584b
                              • Instruction Fuzzy Hash: 2C51FA342197498FE784DF19C594B9AB7E1FB99345F44096DF889CB3A0D7B8E980CB02
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 5bc0e8a7c1d9981df62fde1f654c2988fdc2d987fa76996d3a94c8e8fc7f5162
                              • Instruction ID: 354675748b2643fac173226dba704e487f6f9ec3571fd2fc8b9a369ab0c01689
                              • Opcode Fuzzy Hash: 5bc0e8a7c1d9981df62fde1f654c2988fdc2d987fa76996d3a94c8e8fc7f5162
                              • Instruction Fuzzy Hash: D431F731629E888FE718DF2884463B5B7D5F786304F14119DD4D787253E6A0B9838792
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitProcess
                              • String ID:
                              • API String ID: 621844428-0
                              • Opcode ID: b2e49eecc4650cecdc0ae88ff68cfadcfd13d759e10daa97455afb8b011d043f
                              • Instruction ID: 9db50bfe01b9d2d39785e7e087d03a1a17478108dc2044ffa573e3265a97c47d
                              • Opcode Fuzzy Hash: b2e49eecc4650cecdc0ae88ff68cfadcfd13d759e10daa97455afb8b011d043f
                              • Instruction Fuzzy Hash: D131AF30328A088FDB58DF1DD4C9A6533F1FBAA300F14415EF44AC71A6DA60E883CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: InformationVolume
                              • String ID:
                              • API String ID: 2039140958-0
                              • Opcode ID: 1e2a606bfee192fb295c280de84564edbc6583ac85ffa189bea122fc4c99bd00
                              • Instruction ID: 59e8f22864b909a024fb70835299dc41c7341a80e0125f1ba3bdeb8f1ba7a155
                              • Opcode Fuzzy Hash: 1e2a606bfee192fb295c280de84564edbc6583ac85ffa189bea122fc4c99bd00
                              • Instruction Fuzzy Hash: CA315530218A4C8FD765EF18D8847EA73E5FBD9310F00465AA88EC7295EF709746CB42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: bac77338f76338b17dfae394e38db546f5c72599ad158e480dcab01f8bb866f2
                              • Instruction ID: db075f448a5f19bd25f9799e507be85da3626d540943e890feef905891ddc5d7
                              • Opcode Fuzzy Hash: bac77338f76338b17dfae394e38db546f5c72599ad158e480dcab01f8bb866f2
                              • Instruction Fuzzy Hash: 6B318F30224B889FE345DB28D8847AA77F5FBD9325F144519E849C32E0DBB4E882CB42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 9fb372bf419b8b18e7fed5a67a81708a9f0529748a2ba8a81412138c26b317b9
                              • Instruction ID: 1822fb1aa4d47e97c3398bc5e428e53f89a02d08ee4502178e3f107ac3d3965f
                              • Opcode Fuzzy Hash: 9fb372bf419b8b18e7fed5a67a81708a9f0529748a2ba8a81412138c26b317b9
                              • Instruction Fuzzy Hash: 3121C631728F884BD748EB2C4488675BBE5F7AA305F14427DE4CAC3251E664D9478743
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: BoundaryDeleteDescriptor
                              • String ID:
                              • API String ID: 3203483114-0
                              • Opcode ID: 1e37449890905ab9bc85a0acb699b56a3849bb88109adf205d7c9b46ddfc2453
                              • Instruction ID: 23b636f2421c79b80b51f0fd4552e6fe9a71c3bed5ada656a22a752734427d5a
                              • Opcode Fuzzy Hash: 1e37449890905ab9bc85a0acb699b56a3849bb88109adf205d7c9b46ddfc2453
                              • Instruction Fuzzy Hash: 1011E131737F8A47FB699B3805843B532EAE7DB326F54817C9456C21F1EB64A8838202
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 024b27a2ae161daeb2c3f7db8bbbaae22b9973a9d07e479f219f9b0371d218ad
                              • Instruction ID: 28df4da74ad730064881bb2e215ee695429f27727e0bc0081ae84d418bc4446f
                              • Opcode Fuzzy Hash: 024b27a2ae161daeb2c3f7db8bbbaae22b9973a9d07e479f219f9b0371d218ad
                              • Instruction Fuzzy Hash: 8FF0F630328E8A5FF7A99B6D988877576E5E7E9301F14416EA888C3295D9A0D8C38352
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180990206.000001A41B901000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A41B901000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41b901000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateMutex
                              • String ID:
                              • API String ID: 1964310414-0
                              • Opcode ID: 5665f1e6a04ef665cb6e002583dfa9c6b146fdc296e96a831dc21d2c35bbadb8
                              • Instruction ID: 08ae69fc791bb1289f5047e36090ba5ba5c3bfaf1428e63450e600387eaae015
                              • Opcode Fuzzy Hash: 5665f1e6a04ef665cb6e002583dfa9c6b146fdc296e96a831dc21d2c35bbadb8
                              • Instruction Fuzzy Hash: FA0186303149098FE7949B6CA88D76932D0EB9D322F804679A009C73B5D734D882C792
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001A41A101000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41a101000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 37eb22e3c71014e34abb747e807cbfd367a7a8272921ebcea216e32cb781be8d
                              • Instruction ID: 64e157e71810da40a4704813e8d7a5aa963da4b4f2bfbd34db2737a97f0564f7
                              • Opcode Fuzzy Hash: 37eb22e3c71014e34abb747e807cbfd367a7a8272921ebcea216e32cb781be8d
                              • Instruction Fuzzy Hash: 83E0B630518B899FD780EB28C40875A7BE1FBD8305F404A2EE489D3260D3BC95888B02
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001A41A101000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41a101000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 816fc88231aa2467bf2252115963d1d14762f6c5c40f282537df11a36abcc1ab
                              • Instruction ID: e3abc263b9dac5e943ec176a9f74829b6bcb98c7e00674fe9af25239cb1ab99a
                              • Opcode Fuzzy Hash: 816fc88231aa2467bf2252115963d1d14762f6c5c40f282537df11a36abcc1ab
                              • Instruction Fuzzy Hash: B961E530718B488FD784EB18C088B6AB7E1FBAD355F54496DB48AD7361D778E981CB02
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000016.00000002.2180620271.000001A41A101000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001A41A101000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_22_2_1a41a101000_rundll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: a26db5a74adc6119d098d68705d28c1916c0da013186a83d7531f391c9707544
                              • Instruction ID: 88c28ccf1c5aae7d6b5328831e40f0b3ca24dd68df56a21d5b9d586f12f27eec
                              • Opcode Fuzzy Hash: a26db5a74adc6119d098d68705d28c1916c0da013186a83d7531f391c9707544
                              • Instruction Fuzzy Hash: A9D05E306086448BD708EB38C85821A7BE1F798304F40452DF98ED3360DA3DCA018706
                              Uniqueness

                              Uniqueness Score: -1.00%